Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 2
Abstract
Encryption is the most effective way of computer science concerned with developing schemes and formula to achieve data and information security through the use of codes. Today the privacy is the main issue to sending information from one point to another in data transmission. Encryption is the procedure that allows messages or information to be encoded in such a way that it is extremely difficult to read or understand where decryption is the procedure to transforming encoded text into the original message and information. In this paper we present an algorithm for data encryption and decryption which is based on number theory. In addition, data encryption using strange number system (especially using pentaoctagesimal (SNS) can provide real physical security to data—allowing only authorized users to delete or update data. This algorithm is used pentaoctagesimal strange number system to encrypt data and we propose a better data encryption and decryption strategy, which will offer better security towards all possible ways of attacks while data transmission.
Authors and Affiliations
Debasis Das , U. A. Lanjewar , S. J. Sharma
Detection of Spoofing Using Packet Marking Algorithm
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. However the localization infrastructure can be subjected to non cryptographic attacks, such as signal at...
Identity Management issues in Cloud Computing
Cloud computing is providing a low cost on demand services to the users, omnipresent network, large storage capacity due to these features of cloud computing web applications are moving towards the cloud and due to this...
An Improved Naive Bayes Classification to Enhance Image Registration
Image registration based classification is among the important image processing procedures in medical imaging and remote sensing, it has been developed and studied for a long time. Complex image registration issue arisin...
Aligning Cloud Computing Security with Business Strategy
These days, the technological growth in the IT sector is rapid. Cloud computing is also one of the new technologies that have both benefits and limitations. This paper gives an overview of how cloud computing can be help...
An Efficient Speaker Diarization using Privacy Preserving Audio Features Based of Speech/Non Speech Detection
Privacy-sensitive audio features for speaker diarization in multiparty conversations: i.e., a set of audio features having low linguistic information for speaker diarization in a single and multiple distant microphone sc...