ENCRYPTION METHOD USING PASCAL’S TRIANGLE BASED SUBSTITUTION AND SIERPINSKI TRIANGLE BASED PERMUTATION

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 13

Abstract

Text messages are often created, shared and a person sends at least ten messages a day. Because of its frequent usage those messages are not been encrypted. Thus it is unable to send confidential messages via SMS service. In this paper, we develop a new encryption technique using the notions of Pascals Triangle and Sierpinski Triangle. The proposed method uses the Pascals triangle for substitution and Sierpinski triangle for permutation. The method is simple and easy to implement in real time. It is difficult for the attackers to predict the original message contained in the ciphertext. The proposed method is not much vulnerable to brute force and letter frequency attacks.

Authors and Affiliations

Sivakumar T, Pauvithraa K. T, Durga Devi V

Keywords

Related Articles

Design and Implementation of RSA Algorithm using FPGA

RSA cryptographic algorithm used to encrypt and decrypt the messages to send it over the secure transmission channel like internet.  The RSA algorithm is a secure, high quality, public key algorithm. In this paper, a ne...

A Survey on Features and Techniques in Content Based Image Retrieval

Content-based image retrieval (CBIR) is widely adopted method for finding images from vast collection of images in the database. As the collections of images are growing at a rapid rate, demand for efficient and effectiv...

Predilection of Reusability over Maintainability in Aspect-Oriented Systems

Maintenance is the important phase in software development lifecycle which initiates after the software has been deployed for use. Reusability is an important area of concern which depicts the extent to which a module c...

Study and Comparison of four Agent-Based Simulation Tools: Repast, SeSAm, Netlogo and GAMA

Several simulation tools have been proposed in the literature and many surveys have been realized on this. The objective of this paper is not to give a survey but to compare four principal tools which are Repast, SeSAm,...

FOCUSED CRAWLING TECHNIQUES

The need for more and more specific reply to a web search query has prompted researchers to work on focused web crawling techniques for web spiders. Variety of lexical and link based approaches of focused web crawling ar...

Download PDF file
  • EP ID EP650893
  • DOI 10.24297/ijct.v15i13.4806
  • Views 100
  • Downloads 0

How To Cite

Sivakumar T, Pauvithraa K. T, Durga Devi V (2016). ENCRYPTION METHOD USING PASCAL’S TRIANGLE BASED SUBSTITUTION AND SIERPINSKI TRIANGLE BASED PERMUTATION. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 15(13), 7362-7367. https://europub.co.uk/articles/-A-650893