An Application to ensure Security through Bit-level Encryption
#1

Prepared by:
Mrinmoy Ghosh
Prof. Pranam Paul


Abstract

This paper presents a process by which we can secure any kind of file. The newly developed encryption algorithm is presented in this paper. With help of generated distinct blocks N-level, again some distinct blocks are regenerated for (N + 1)-level. Thus, source stream or plain text, target stream or encrypted text will be generated and decrypted text will be gotten on the applying the reverse process. The algorithm can be implemented on any kind file as it is implemented in bit-level. The strength of the technique is analyzed in this paper.


[size=large]Introduction[/size

Cryptography is an essential tool of data security through mathematical manipulation of data with an incomprehensible format for unauthorized person. Here a newly developed technique named, “Replacement of Cyclic Regeneration of Distinct Block (RCRDB)” is discussed. At first, plain text is decomposed into some blocks, having equal length. With help of all distinct blocks, some distinct blocks have been regenerated. The process will be continued up to a finite level of regeneration. Finally by rearrangement and replacement of all blocks in source stream or plain text, target stream or encrypted text will be generated. Hence getting source stream and the privet key, decrypted text will be gotten on the applying the reverse process.

Section 2 presents the scheme followed in the encryption technique. Section 3 describes an implementation of the technique. Section 4 presents results of executing the technique on some real files. Section 5 is an analytical discussion on the technique with a conclusion.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: working and application of 4 bit controlled inverter, project on an application to ensure security through bit level encryption, auto selection of optimum power from 4 different sources solar mains generator inverter to ensure no break power, bit level cryptography, project on an applictation to ensure security thriugh bit level encryption, network security encryption, what roaming issues should you consider to support vowifi users and ensure continuous service during the handoff time,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,513 24-11-2018, 01:19 AM
Last Post:
  Data Encryption Standard (DES) seminar class 2 9,353 20-02-2016, 01:59 PM
Last Post: seminar report asees
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,213 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 14,926 30-03-2014, 04:40 AM
Last Post: Guest
  XML encryption full report computer science technology 6 12,779 21-03-2014, 05:22 PM
Last Post: MichaelPn
  Security in Data Warehousing seminar surveyer 3 9,929 12-08-2013, 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 11,854 27-07-2013, 01:06 PM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 13,627 24-06-2013, 11:44 AM
Last Post: Guest
  Particle Swarm Optimization Algorithm and Its Application in Engineering Design Optim computer science crazy 3 5,490 03-05-2013, 10:28 AM
Last Post: computer topic
  Security System using Biometrics ( Download Full Seminar Report ) computer science crazy 7 10,346 02-02-2013, 03:56 PM
Last Post: seminar details

Forum Jump: