Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

An Encryption Algorithm for Secure Data Transmission

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 40 - Number 7
Year of Publication: 2012
Authors:
Rohan Rayarikar
Sanket Upadhyay
Deeshen Shah
10.5120/4980-7238

Rohan Rayarikar, Sanket Upadhyay and Deeshen Shah. Article: An Encryption Algorithm for Secure Data Transmission. International Journal of Computer Applications 40(7):43-47, February 2012. Full text available. BibTeX

@article{key:article,
	author = {Rohan Rayarikar and Sanket Upadhyay and Deeshen Shah},
	title = {Article: An Encryption Algorithm for Secure Data Transmission},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {40},
	number = {7},
	pages = {43-47},
	month = {February},
	note = {Full text available}
}

Abstract

Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. We have proposed a new algorithm based on the concept used by Rijmen and Daemen (Rijndael algorithm), the founders of AES algorithm. The proposed algorithm encrypts and decrypts two 128 bits data simultaneously i.e. 256 bits data, thus providing strong encryption accompanied with complex processing. The proposed Feistal algorithm uses various invertible, self-invertible, and non-invertible components of modern encryption ciphers and key generation same as that of AES. This algorithm provides a secure, fast, and strong encryption of the data. There is a huge amount of confusion and diffusion of the data during encryption which makes it very difficult for an attacker to interpret the encryption pattern and the plain text form of the encrypted data. The proposed algorithm is also resistant to Brute-Force and pattern attacks.

References

    Security