Analysis of Four Stage Encryption
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 6
Abstract
Four Stage Encryption generates the output alphabet from a given input alphabet. The size of the output alphabet depends upon the key K0. Unless this key is known, it is difficult to guess the size of the output alphabet. Further the output alphabet is permuted with the help of the key K1 and then partitioned using K2. So the encryption scheme is powerful when compared with the existing encryption schemes.
Authors and Affiliations
Dr. Gomatam V S Acharyulu, Sangapu V Appaji
Alcohol Detection System
This system provides a unique method to curb drunken people. The system has an alcohol sensor embedded on the steering of the car. Whenever the driver starts ignition, the sensor measures the content of the alcohol i...
Loss less Data Compression using DCT to Optimize the compression Ratio
This work studies of the problem and demonstrates the viability of the suggested methodology with simulation runs onthe International Symposium on Circuits and Systems (ISCAS) 85 combinational and ISCAS 89 full-scan...
An Enhanced Technique for Transferring the Image Using Wavelet SVD Mosaic Images Under Color Retrieval Mode
Insurance about advanced media content need turned into a progressively paramount issue for content managers also administration suppliers. Likewise watermark distinguished about illustration, a major engineering org...
Risk Management in ERP Implementation
“There can be no great accomplishment without risk”, says by the Neil Armstrong. Risk management is very crucial and vital task in the current era of competitive business for any organization, who takes the various ki...
Recent Trends In 4G Over 3G Technology
The objective of this paper is to evaluate recent trends in Fourth generation (4G) mobile services. Given the success of Third generation (3G) mobile communications systems and services, the third generation mobile n...