Downloads: 112 | Views: 292
Research Paper | Information Technology | India | Volume 6 Issue 6, June 2017 | Popularity: 6.8 / 10
An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques
Kavyashree S, Manjula V, Gnanashree S
Abstract: In the current world scenario, securing the data is really an important criteria for high confidentiality, integrity and authenticity. The technique which is used to attain the high confidentiality is called cryptography. As the time changes people have started to access the technology regardless of geographical conditions and time. Internet is the major source of usage for all the financial transactions. Internet is well known for providing conveniences and equally prone for causing inconveniences with respect to security issues. Therefore, internet security became important to be achieved. This paper provides the methodology to encrypt the information by the usage of three set of key values including Armstrong numbers and colors as the password. Here the input is taken in the form text message and converted to ASCII equivalents.
Keywords: Cryptography, Encryption, Decryption, RGB Color, Armstrong numbers
Edition: Volume 6 Issue 6, June 2017
Pages: 1459 - 1462
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017
Pages: 2495 - 2503Migrations: Challenges and Best Practices for Migrating Legacy Systems to Cloud-Based Platforms
Kishore Gade
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Information Technology, India, Volume 11 Issue 10, October 2022
Pages: 959 - 963Medical Data Security using RSA and Visual Cryptography
Bency Wilson, Jesline Abraham
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020
Pages: 1850 - 1857Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms
Jeevan Manda
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 10 Issue 8, August 2021
Pages: 1309 - 1318Performance Analysis of Data Exchange Protocols in Cloud Environments
Sai Kumar Reddy Thumburu
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, United States of America, Volume 12 Issue 1, January 2023
Pages: 1387 - 1398Multi-Cloud Data Resilience: Implementing Cross-Platform Data Strategies with Snowflake for P&C Insurance Operations
Sateesh Reddy Adavelli