Four Stage Encryption

Abstract

Symmetric key Block ciphers have proven and widely used encryption and decryption methods. Still they lack security without proper modes of operations. A four stage encryption method suggested in this paper provides a stronger secured encryption scheme by itself even without implementing any modes of operation.

Authors and Affiliations

Gomatam Venkata Sudarsan Acharyulu, Sangapu V Appaji

Keywords

Related Articles

Unique i : An Integrated Automated Altered Fingerprint Identification System

Fingerprint identification systems are very useful in several biometric applications. They are capable of finding correct person with proper identification. Fingerprint identification systems are based on fingerprint...

Integrity And Confidentiality for Network Security

We compute the liability metric as a function of the steering and the cryptographic protocols used to secure the complex passage. We formulate the minimum cost node capture attack problem as a nonlinear integer progra...

An Efficient Method for Steganography in Videos

This paper applies steganography algorithm in videos. In proposed method we are hiding the data in a compressed video by using optimal pixel adjustment process (OPAP). Secrete Message is first encrypted by using cryp...

Dynamic ModelingAnd Control Of Wind/Pv/Battery Sources Integrated For Distributed Energy Production

This paper proposes a cross breed vitality framework comprising of wind, photovoltaic and energy component. Battery stockpiling is intended to supply persistent force and to give the deficiency power when the joined...

Short Term Load Forecasting Using Artificial Neural Networks

The main objective of the paper is to forecast the load for the next 24 hours, as well one week, considering one month of load data. Load forecasting is an important problem in the operation and planning of electrica...

Download PDF file
  • EP ID EP27453
  • DOI -
  • Views 333
  • Downloads 6

How To Cite

Gomatam Venkata Sudarsan Acharyulu, Sangapu V Appaji (2012). Four Stage Encryption. International Journal of Research in Computer and Communication Technology, 1(4), -. https://europub.co.uk/articles/-A-27453