CFP last date
22 April 2024
Reseach Article

Encryption and Decryption using 3D Matrices

Published on April 2015 by Priya.r, Janani.r, Lejna.m, Mangai Siva Surya.j, Nandhini.m, Rajalakshmi.v
National Conference on Information Processing and Remote Computing
Foundation of Computer Science USA
NCIPRC2015 - Number 2
April 2015
Authors: Priya.r, Janani.r, Lejna.m, Mangai Siva Surya.j, Nandhini.m, Rajalakshmi.v
8055b88e-575e-42b4-af9e-ccea451eba38

Priya.r, Janani.r, Lejna.m, Mangai Siva Surya.j, Nandhini.m, Rajalakshmi.v . Encryption and Decryption using 3D Matrices. National Conference on Information Processing and Remote Computing. NCIPRC2015, 2 (April 2015), 12-16.

@article{
author = { Priya.r, Janani.r, Lejna.m, Mangai Siva Surya.j, Nandhini.m, Rajalakshmi.v },
title = { Encryption and Decryption using 3D Matrices },
journal = { National Conference on Information Processing and Remote Computing },
issue_date = { April 2015 },
volume = { NCIPRC2015 },
number = { 2 },
month = { April },
year = { 2015 },
issn = 0975-8887,
pages = { 12-16 },
numpages = 5,
url = { /proceedings/nciprc2015/number2/20511-8010/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Information Processing and Remote Computing
%A Priya.r
%A Janani.r
%A Lejna.m
%A Mangai Siva Surya.j
%A Nandhini.m
%A Rajalakshmi.v
%T Encryption and Decryption using 3D Matrices
%J National Conference on Information Processing and Remote Computing
%@ 0975-8887
%V NCIPRC2015
%N 2
%P 12-16
%D 2015
%I International Journal of Computer Applications
Abstract

With rapid evolution of science and technology, people rely on networks a lot; the aspect of security receives a lot of attention. With a notion to provide security, many algorithms have been proposed in the world. This paper proposes a new method for encrypting and decrypting the data by using Shared-Secret Key, Session Key and Intermediate Key. Based on the length of plain text variable number of Session Key and Intermediate Key are generated.

References
  1. Balajee Maram, K Lakshmana Rao, Y Ramesh Kumar, "Encryption and Decryption Algorithm using 2-D Matrices", International Journal of Advanced Research in Computer Science and Software Engineering Research Paper,(IJARCSSE), Vol. 3, Issue 4, April-2013
  2. Balajee Maram and Narasimham Chella, "Double-reflecting Data Perturbation Method for Information Security", Oriental Journal of Computer Science & Technology, Vol. 5, No. (2): Pp. 283-288, December 2012
  3. Behrouz . A. Forouzan, "Cryptography and Network Security", first edition, Tata McGraw-Hill Companies, 2007
  4. Viji Amutha Mary, Dr. T. Jebarajan, "A Novel Data Perturbation Technique with higher Security", IJCET, No. 3(2): Pp. 126-132, 2012
  5. William Stallings, "Cryptography and Network Security- principles and practice", fifth edition, Pearson, 2011
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Drdp