Text Encryption and Decryption using Triple Keys Symmetric Cryptography

Abstract

Interchange of information over the network is increasing very rapidly. Transferring any information on internet arises with the biggest issue that is security. Surety must be provided at any cost. Cryptography plays an important role in achieving security. For any type of business our primary focus is mainly on the security of information for that we require a robust and unbreakable process that provides great safety. When we transmit sensitive information over an insecure medium then various types of attacks like Brute force and Cryptanalytic attacks are possible in which message and key can be recovered. In recent years, many encryption technologies have taken advancements to secure the information that is transmitted over the network. In this paper, we proposed an algorithm, which uses triple keys for encryption and decryption of text to secure the information.

Authors and Affiliations

Ritu Last Name, Girija Srikanth

Keywords

Related Articles

Pattern Matching and Analysis of Vehicle Number Plate’s Recognition System Using Template Matching

A pattern is any arrangement of objects or entities. The term "arrangement" is used here to indicate that a pattern is by definition non-random and at least potentially describable. All theories imply some pattern, but...

A Review of Water Absorption, Porosity and Sorptivity of Cement Mortar made with metakaolin and flyash partially replaced in cement cured in seawater

In this present study the effects of flyash, metakaolin and their combinations has been evaluated for optimal level of replacement as blending component in cement. The results showed that the water absorption, porosity...

slugUnderstanding How Crucial Hidden Value Discovery in Data Warehouse Is?

Since the origin of data mining concepts, this area of research has proved to be quite promising and fastest evolving in computer science field. Due to the rapid growth in the demand of the speedy access and fast proces...

Design and Implementation of High Voltage Integrated Class-B Amplifier for Ultra Sound Transducers

Pulsers are usually adopted in ultra sound applications due to their efficiency. On the other hand, amplifiers would enable apodization profiles with high resolution; beams with low harmonic content and instantaneous ch...

Mathematical Modelling Of Blood Flow through Three Layered Stenosed Artry

A three layer mathematical model is presented to study the blood flow characteristics using blood fluid as casson’s and bingham plastic fluid model. The important characteristics of blood flow such as velocity profile,...

Download PDF file
  • EP ID EP24104
  • DOI -
  • Views 263
  • Downloads 12

How To Cite

Ritu Last Name, Girija Srikanth (2017). Text Encryption and Decryption using Triple Keys Symmetric Cryptography. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(5), -. https://europub.co.uk/articles/-A-24104