Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 2
Abstract
Encryption is the most effective way of computer science concerned with developing schemes and formula to achieve data and information security through the use of codes. Today the privacy is the main issue to sending information from one point to another in data transmission. Encryption is the procedure that allows messages or information to be encoded in such a way that it is extremely difficult to read or understand where decryption is the procedure to transforming encoded text into the original message and information. In this paper we present an algorithm for data encryption and decryption which is based on number theory. In addition, data encryption using strange number system (especially using pentaoctagesimal (SNS) can provide real physical security to data—allowing only authorized users to delete or update data. This algorithm is used pentaoctagesimal strange number system to encrypt data and we propose a better data encryption and decryption strategy, which will offer better security towards all possible ways of attacks while data transmission.
Authors and Affiliations
Debasis Das , U. A. Lanjewar , S. J. Sharma
Enhance the XML Documents Security using Web Services
An increasing amount of semi-structured data, XML has become fundamental to humans and programs. XML changed by the World Wide Web Consortium (w3c) is quickly emerging as a new standard language for semi-structured data...
Optimizing Resource Allocation in IAAS Clouds
Cloud computing is a phenomenon which bestows new model of computing. It has various service modes. The service model which provides on-demand access to computing resources is known as infrastructure-as-a-service (IaaS)....
PMA-Chord: Peer Mobility Adaptable Lookup for Chord Protocol
Structured Overlay Networks provide a promising system for high-performance applications because they may be fault-tolerant, scalable and self managing. Organized overlays provide lookup services that guide keys to nodes...
Locate Misplaced Objects! GPS-GSM-Bluetooth Enabled Tracking
Every house has had a history of searching for keys, pen-drives, wallets and hand-purses and it is such a tedious job, especially, when they are of utmost need. To reduce the hectic searching effort and time spent, a sys...
Multi-Level Association Rule Mining: A Review
Association rule mining is the most popular technique in the area of data mining. The main task of this technique is to find the frequent patterns by using minimum support thresholds decided by the user. The Apriori algo...