International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112 | Views: 292

Research Paper | Information Technology | India | Volume 6 Issue 6, June 2017 | Popularity: 6.8 / 10


     

An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques

Kavyashree S, Manjula V, Gnanashree S


Abstract: In the current world scenario, securing the data is really an important criteria for high confidentiality, integrity and authenticity. The technique which is used to attain the high confidentiality is called cryptography. As the time changes people have started to access the technology regardless of geographical conditions and time. Internet is the major source of usage for all the financial transactions. Internet is well known for providing conveniences and equally prone for causing inconveniences with respect to security issues. Therefore, internet security became important to be achieved. This paper provides the methodology to encrypt the information by the usage of three set of key values including Armstrong numbers and colors as the password. Here the input is taken in the form text message and converted to ASCII equivalents.


Keywords: Cryptography, Encryption, Decryption, RGB Color, Armstrong numbers


Edition: Volume 6 Issue 6, June 2017


Pages: 1459 - 1462



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Kavyashree S, Manjula V, Gnanashree S, "An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 1459-1462, https://www.ijsr.net/getabstract.php?paperid=ART20174545, DOI: https://www.doi.org/10.21275/ART20174545



Similar Articles

Downloads: 0

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 2495 - 2503

Migrations: Challenges and Best Practices for Migrating Legacy Systems to Cloud-Based Platforms

Kishore Gade

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 959 - 963

Medical Data Security using RSA and Visual Cryptography

Bency Wilson, Jesline Abraham

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 8, August 2021

Pages: 1309 - 1318

Performance Analysis of Data Exchange Protocols in Cloud Environments

Sai Kumar Reddy Thumburu

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, United States of America, Volume 12 Issue 1, January 2023

Pages: 1387 - 1398

Multi-Cloud Data Resilience: Implementing Cross-Platform Data Strategies with Snowflake for P&C Insurance Operations

Sateesh Reddy Adavelli

Share this Article
Top