Text Encryption and Decryption using Triple Keys Symmetric Cryptography
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
Interchange of information over the network is increasing very rapidly. Transferring any information on internet arises with the biggest issue that is security. Surety must be provided at any cost. Cryptography plays an important role in achieving security. For any type of business our primary focus is mainly on the security of information for that we require a robust and unbreakable process that provides great safety. When we transmit sensitive information over an insecure medium then various types of attacks like Brute force and Cryptanalytic attacks are possible in which message and key can be recovered. In recent years, many encryption technologies have taken advancements to secure the information that is transmitted over the network. In this paper, we proposed an algorithm, which uses triple keys for encryption and decryption of text to secure the information.
Authors and Affiliations
Ritu Last Name, Girija Srikanth
Performance Analysis of Fitness Scaling Functions in Genetic Algorithm
Genetic algorithm is one of the heuristic methods of searching and optimization technique used today. Optimization deals with the problem of minimizing or maximizing the function using several variables subject to eithe...
A Novel System to Tackle Hospital Acquired Pressure Ulcer Patients
Health related problems are tremendously increasing in our day to day life. Hospital acquired pressure ulcers (HAPUs) is a major problem that affects the patients who are admitted in hospital with sudden illness for a l...
Fuzzy Logic Controller Based Speed Analysis and Control of DC Shunt Motor
In this paper, various speed control techniques for a dc shunt motor namely conventional PID controller and fuzzy logic controller, using a PID controller and Fuzzy Logic Controller have been discussed and a comparative...
Performance Evaluation of Procedural Cognitive Complexity Metric on Imperative Programming Languages
Software metrics is an acceptable measure of software quality. An improved complexity metric named procedural cognitive complexity metric (PCCM) that consider factors affecting the complexity of a procedural programming...
Application Of Plan-Do-Check-Act Cycle For Quality And Productivity Improvement - A Review
The PDCA Cycle is a systematic series of steps for gaining valuable learning and knowledge for the continual improvement of a product or process. PDCA is an iterative four-step quality improvement and productivity impro...