ENCRYPTION METHOD USING PASCAL’S TRIANGLE BASED SUBSTITUTION AND SIERPINSKI TRIANGLE BASED PERMUTATION

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 13

Abstract

Text messages are often created, shared and a person sends at least ten messages a day. Because of its frequent usage those messages are not been encrypted. Thus it is unable to send confidential messages via SMS service. In this paper, we develop a new encryption technique using the notions of Pascals Triangle and Sierpinski Triangle. The proposed method uses the Pascals triangle for substitution and Sierpinski triangle for permutation. The method is simple and easy to implement in real time. It is difficult for the attackers to predict the original message contained in the ciphertext. The proposed method is not much vulnerable to brute force and letter frequency attacks.

Authors and Affiliations

Sivakumar T, Pauvithraa K. T, Durga Devi V

Keywords

Related Articles

Validation of DeLone and McLean model to analyze decision support systems success in the banking sector of Oman

The main objective of this paper is to investigate empirically the validity of DeLone and McLean model in measuring the decision support system success in the banking sector of Oman. Data was collected from decision supp...

The Impact of Social Media on Workplace Culture

Social media has begun long time ago, and recently has immeasurable popularity across the globe. People tended to use this technology in making new friends, keeping up with their own friends, and most significantly sha...

An Offline SEO (Search Engine Optimization) Based Algorithm to Calculate Web Page Rank According to Different Parameters

SEO stands for Search Engine Optimization. It is a technique that searches various web pages for specified keywords and ranks these Web pages according to some parameters. They are used to feed pages to search engines. Â...

OPPORTUNISTIC APPROACH TO EXPLOIT WIRELESS SPECTRUM BY USE OF COGNITIVE RADIO

Cognitive radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectru...

Analysis and Detection of Bot performing Keylogging Activities.

The focus on computer security has increased due to the ubiquitous use of Internet. Botnets are one of the biggest cyber threats. Botnet is a malware controlled by a Botmaster using Command and Control (C&C). Botnet...

Download PDF file
  • EP ID EP650893
  • DOI 10.24297/ijct.v15i13.4806
  • Views 99
  • Downloads 0

How To Cite

Sivakumar T, Pauvithraa K. T, Durga Devi V (2016). ENCRYPTION METHOD USING PASCAL’S TRIANGLE BASED SUBSTITUTION AND SIERPINSKI TRIANGLE BASED PERMUTATION. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 15(13), 7362-7367. https://europub.co.uk/articles/-A-650893