CFP last date
21 October 2024
Reseach Article

An Improved Approach of Cryptography using Triangulation and MSB Iteration Technique

Published on March 2013 by Monalisa Dey, Dhirendra Prasad Yadav, Sanik Kumar Mahata, Anupam Mondal, Sudipta Sahana
International Conference on Computing, Communication and Sensor Network
Foundation of Computer Science USA
CCSN2012 - Number 4
March 2013
Authors: Monalisa Dey, Dhirendra Prasad Yadav, Sanik Kumar Mahata, Anupam Mondal, Sudipta Sahana
1b0ab77b-46db-4a39-8837-41a5659dd9c3

Monalisa Dey, Dhirendra Prasad Yadav, Sanik Kumar Mahata, Anupam Mondal, Sudipta Sahana . An Improved Approach of Cryptography using Triangulation and MSB Iteration Technique. International Conference on Computing, Communication and Sensor Network. CCSN2012, 4 (March 2013), 16-18.

@article{
author = { Monalisa Dey, Dhirendra Prasad Yadav, Sanik Kumar Mahata, Anupam Mondal, Sudipta Sahana },
title = { An Improved Approach of Cryptography using Triangulation and MSB Iteration Technique },
journal = { International Conference on Computing, Communication and Sensor Network },
issue_date = { March 2013 },
volume = { CCSN2012 },
number = { 4 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 16-18 },
numpages = 3,
url = { /specialissues/ccsn2012/number4/10872-1037/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Computing, Communication and Sensor Network
%A Monalisa Dey
%A Dhirendra Prasad Yadav
%A Sanik Kumar Mahata
%A Anupam Mondal
%A Sudipta Sahana
%T An Improved Approach of Cryptography using Triangulation and MSB Iteration Technique
%J International Conference on Computing, Communication and Sensor Network
%@ 0975-8887
%V CCSN2012
%N 4
%P 16-18
%D 2013
%I International Journal of Computer Applications
Abstract

In our ever-increasingly connected world, the need for communicating data over the internet has grown considerably. This data can be intercepted and hence needs to be guarded against fraudulent access. In cryptography, encryption is a critical security measure for protecting data privacy. The proposed work introduces an encryption scheme to achieve this purpose. The entire process is done on binary data, so it will encompass all kinds of data in the field of Computer Science.

References
  1. J. K. Mandal, S. Dutta, "A 256-bit recursive pair parity encoder for encryption", Advances D -2004, Vol. 9 nº1, Association for the Advancement of Modelling and Simulation Techniques in Enterprises (AMSE, France), www. AMSE-Modeling. org, pp. 1-14
  2. Dutta S. , Mal S. , "A Multiplexing Triangular Encryption Technique – A move towards enhancing security in ECommerce", Proceedings of IT Conference (organized by Computer Association of Nepal), 26 and 27 January, 2002, BICC, Kathmandu.
  3. William Stallings, Cryptography and network security, 2005, 4th Edition, Prentice Hall.
  4. Atul Kahate, Cryptography and network security, 2005, 4th reprint, Tata McGraw-Hill.
Index Terms

Computer Science
Information Sciences

Keywords

Fraudulent Access Cryptography Encryption