Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

An Improved Approach of Cryptography using Triangulation and MSB Iteration Technique

Print
PDF
IJCA Special Issue on International Conference on Computing, Communication and Sensor Network
© 2013 by IJCA Journal
CCSN2012 - Number 4
Year of Publication: 2013
Authors:
Monalisa Dey
Dhirendra Prasad Yadav
Sanik Kumar Mahata
Anupam Mondal
Sudipta Sahana

Monalisa Dey, Dhirendra Prasad Yadav, Sanik Kumar Mahata, Anupam Mondal and Sudipta Sahana. Article: An Improved Approach of Cryptography using Triangulation and MSB Iteration Technique. IJCA Special Issue on International Conference on Computing, Communication and Sensor Network CCSN2012(4):16-18, March 2013. Full text available. BibTeX

@article{key:article,
	author = {Monalisa Dey and Dhirendra Prasad Yadav and Sanik Kumar Mahata and Anupam Mondal and Sudipta Sahana},
	title = {Article: An Improved Approach of Cryptography using Triangulation and MSB Iteration Technique},
	journal = {IJCA Special Issue on International Conference on Computing, Communication and Sensor Network},
	year = {2013},
	volume = {CCSN2012},
	number = {4},
	pages = {16-18},
	month = {March},
	note = {Full text available}
}

Abstract

In our ever-increasingly connected world, the need for communicating data over the internet has grown considerably. This data can be intercepted and hence needs to be guarded against fraudulent access. In cryptography, encryption is a critical security measure for protecting data privacy. The proposed work introduces an encryption scheme to achieve this purpose. The entire process is done on binary data, so it will encompass all kinds of data in the field of Computer Science.

References

  • J. K. Mandal, S. Dutta, "A 256-bit recursive pair parity encoder for encryption", Advances D -2004, Vol. 9 nº1, Association for the Advancement of Modelling and Simulation Techniques in Enterprises (AMSE, France), www. AMSE-Modeling. org, pp. 1-14
  • Dutta S. , Mal S. , "A Multiplexing Triangular Encryption Technique – A move towards enhancing security in ECommerce", Proceedings of IT Conference (organized by Computer Association of Nepal), 26 and 27 January, 2002, BICC, Kathmandu.
  • William Stallings, Cryptography and network security, 2005, 4th Edition, Prentice Hall.
  • Atul Kahate, Cryptography and network security, 2005, 4th reprint, Tata McGraw-Hill.