ENCRYPTION METHOD USING PASCAL’S TRIANGLE BASED SUBSTITUTION AND SIERPINSKI TRIANGLE BASED PERMUTATION
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 13
Abstract
Text messages are often created, shared and a person sends at least ten messages a day. Because of its frequent usage those messages are not been encrypted. Thus it is unable to send confidential messages via SMS service. In this paper, we develop a new encryption technique using the notions of Pascals Triangle and Sierpinski Triangle. The proposed method uses the Pascals triangle for substitution and Sierpinski triangle for permutation. The method is simple and easy to implement in real time. It is difficult for the attackers to predict the original message contained in the ciphertext. The proposed method is not much vulnerable to brute force and letter frequency attacks.
Authors and Affiliations
Sivakumar T, Pauvithraa K. T, Durga Devi V
Validation of DeLone and McLean model to analyze decision support systems success in the banking sector of Oman
The main objective of this paper is to investigate empirically the validity of DeLone and McLean model in measuring the decision support system success in the banking sector of Oman. Data was collected from decision supp...
The Impact of Social Media on Workplace Culture
Social media has begun long time ago, and recently has immeasurable popularity across the globe. People tended to use this technology in making new friends, keeping up with their own friends, and most significantly sha...
An Offline SEO (Search Engine Optimization) Based Algorithm to Calculate Web Page Rank According to Different Parameters
SEO stands for Search Engine Optimization. It is a technique that searches various web pages for specified keywords and ranks these Web pages according to some parameters. They are used to feed pages to search engines. Â...
OPPORTUNISTIC APPROACH TO EXPLOIT WIRELESS SPECTRUM BY USE OF COGNITIVE RADIO
Cognitive radio (CR) technology is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectru...
Analysis and Detection of Bot performing Keylogging Activities.
The focus on computer security has increased due to the ubiquitous use of Internet. Botnets are one of the biggest cyber threats. Botnet is a malware controlled by a Botmaster using Command and Control (C&C). Botnet...