Four Stage Encryption

Abstract

Symmetric key Block ciphers have proven and widely used encryption and decryption methods. Still they lack security without proper modes of operations. A four stage encryption method suggested in this paper provides a stronger secured encryption scheme by itself even without implementing any modes of operation.

Authors and Affiliations

Gomatam Venkata Sudarsan Acharyulu, Sangapu V Appaji

Keywords

Related Articles

Performance Issues of WMNs by implementing Coordinator in IEEE 802.11 Networks

The wireless networking is the current trend that most of the peoples that used and fastly grow in the world. The number of topologies has been used in this network and few are Star, Bus , Mesh etc. but the Mesh Topol...

Safety Defending Delegated Admittance Mechanism in Public Clouds

Cloud computing, as a rising registering standard. Cloud computing empowers clients to remotely store their information in a cloud furthermore profit by administrations on-interest. With fast improvement of cloud com...

Provide Secure And Privacy-Preserving Access Control To Users Anonymously Utilize The Cloud Resource Using Mona

Involvement in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue due to the regular change of the membership.In the meantime the storage overhead and...

Performance Analysis of Improved ODMRP with Motion Detection (IOMD) in Mobile Ad Hoc Network

Multicast transmission is a more effective mechanism when more effective mechanism to unicasts for group communication based applications and of due importance to future network development. Multicasting in ad hoc ne...

Transmission Power Control in Wireless ad hoc Networks

In ad hoc wireless networks packets are relayed over multiple hops to reach their destination. In order to operate ad hoc networks several protocols, for media access control, power control, routing, and transport ar...

Download PDF file
  • EP ID EP27453
  • DOI -
  • Views 355
  • Downloads 6

How To Cite

Gomatam Venkata Sudarsan Acharyulu, Sangapu V Appaji (2012). Four Stage Encryption. International Journal of Research in Computer and Communication Technology, 1(4), -. https://europub.co.uk/articles/-A-27453