ENCRYPTION METHOD USING PASCAL’S TRIANGLE BASED SUBSTITUTION AND SIERPINSKI TRIANGLE BASED PERMUTATION
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 13
Abstract
Text messages are often created, shared and a person sends at least ten messages a day. Because of its frequent usage those messages are not been encrypted. Thus it is unable to send confidential messages via SMS service. In this paper, we develop a new encryption technique using the notions of Pascals Triangle and Sierpinski Triangle. The proposed method uses the Pascals triangle for substitution and Sierpinski triangle for permutation. The method is simple and easy to implement in real time. It is difficult for the attackers to predict the original message contained in the ciphertext. The proposed method is not much vulnerable to brute force and letter frequency attacks.
Authors and Affiliations
Sivakumar T, Pauvithraa K. T, Durga Devi V
OPTIMIZATION OF CHANNEL ALLOCATION ALGORITHM FOR HOT SPOT CELLS IN WIRELESS NETWORKS
Dense deployment of cellular networks is leading to scarcity of communication bandwidth or what we call as channel. If compared to its wired counterparts, wireless cellular network have limited number of channels availab...
Image Enhancement based on Contrast Enhancement & Fuzzification Histogram Equalization and Comparison with Contrast Enhancement Techniques
Contrast Enhancement is a technique which comes into the part of Image Enhancement. Contrast Enhancement is used to enhance the visual quality of any captured or other image. Contrast Enhancement can be performed with th...
Optimal Interactive Rainfall Maps (Iraq) in Client Side and Google Earth
Global environment change has become a worldwide concern in recent years. Rainfall is an important climatologically parameter, and knowledge of its temporal and spatial patterns is useful for researchers working in many...
Intrusion Detection Techniques based on Cross Layer For Wireless Local Area Networks
In this paper, we propose to design a cross-layer based intrusion detection technique for wireless networks. In this technique a combined weight value is computed from the Received Signal Strength (RSS) and Time Taken fo...
SOFTWARE CODE CLONE DETECTION MODEL USING HYBRID APPROACH
The aspiration of this study is to understand and analyze the concept of software Cloning and its detection. Software cloning is an acuity in which source code is duplicated. Software cloning and its detection is one of...