An Application to ensure Security through Bit-level Encryption
#1

Prepared by:
Mrinmoy Ghosh
Prof. Pranam Paul


Abstract

This paper presents a process by which we can secure any kind of file. The newly developed encryption algorithm is presented in this paper. With help of generated distinct blocks N-level, again some distinct blocks are regenerated for (N + 1)-level. Thus, source stream or plain text, target stream or encrypted text will be generated and decrypted text will be gotten on the applying the reverse process. The algorithm can be implemented on any kind file as it is implemented in bit-level. The strength of the technique is analyzed in this paper.


[size=large]Introduction[/size

Cryptography is an essential tool of data security through mathematical manipulation of data with an incomprehensible format for unauthorized person. Here a newly developed technique named, “Replacement of Cyclic Regeneration of Distinct Block (RCRDB)” is discussed. At first, plain text is decomposed into some blocks, having equal length. With help of all distinct blocks, some distinct blocks have been regenerated. The process will be continued up to a finite level of regeneration. Finally by rearrangement and replacement of all blocks in source stream or plain text, target stream or encrypted text will be generated. Hence getting source stream and the privet key, decrypted text will be gotten on the applying the reverse process.

Section 2 presents the scheme followed in the encryption technique. Section 3 describes an implementation of the technique. Section 4 presents results of executing the technique on some real files. Section 5 is an analytical discussion on the technique with a conclusion.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: application security, project on an applictation to ensure security thriugh bit level encryption, 1 bit amplification application, source code for ensure data in cloud, project on an application to ensure security through bit level encryption, working and application of 4 bit controlled inverter, auto selection of optimum power from 4 different sources solar mains generator inverter to ensure no break power,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,845 24-11-2018, 01:19 AM
Last Post:
  Data Encryption Standard (DES) seminar class 2 9,384 20-02-2016, 01:59 PM
Last Post: seminar report asees
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,424 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 15,101 30-03-2014, 04:40 AM
Last Post: Guest
  XML encryption full report computer science technology 6 12,804 21-03-2014, 05:22 PM
Last Post: MichaelPn
  Security in Data Warehousing seminar surveyer 3 10,089 12-08-2013, 10:24 AM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR smart paper boy 7 12,054 27-07-2013, 01:06 PM
Last Post: computer topic
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 9 13,831 24-06-2013, 11:44 AM
Last Post: Guest
  Particle Swarm Optimization Algorithm and Its Application in Engineering Design Optim computer science crazy 3 5,503 03-05-2013, 10:28 AM
Last Post: computer topic
  Security System using Biometrics ( Download Full Seminar Report ) computer science crazy 7 10,357 02-02-2013, 03:56 PM
Last Post: seminar details

Forum Jump: