Reveiw of effective data encryption and decryption technique

Authors

  • Ramalingam Sugumar Dept .of Computer Science and Application, Christhuraj College, Panjappur,Trichy- 620012, India
  • Tamilenthi S Department of Earth Science, Tamil University, Thanjavur- 613 010, India
  • Gurunathan M Dept .of Computer Science and Application, Christhuraj College, Panjappur,Trichy- 620012, India

Keywords:

Encryption, Decryption, Caesar cipher and transposition cipher.

Abstract

The requirements of information security within an organization have undergone two major changes in the last several decades. Before the wide spread use of data processing equipment, the security of information  felt to be valuable to an organization was provided primarily by physical and administrative means. The collection of tools designed to protect data and to thwart hacker is computer security. Network security measures are needed to protect data during their transmission. This technique for encryption and decryption process to combine two methods ceaser cipher and transposition cipher, ceaser cipher is one of the substitution techniques. A substitution technique is one in which the letters of plain text are replaced by other letter or by numbers or symbols. if the plaintext is viewed as a sequence of bits, then substitution involves replacing plaintext bit patterns with cipher text bit patterns. The encryption process is two stages first, to convert the given plaintext into cipher text using ceaser cipher text technique, second stage the cipher converted using transposition technique, the final output is cipher text, The Decryption is the reverse process of the Encryption.

Downloads

Download data is not yet available.

Author Biographies

Ramalingam Sugumar, Dept .of Computer Science and Application, Christhuraj College, Panjappur,Trichy- 620012, India

Dept .of Computer Science and Application, Christhuraj College, Panjappur,Trichy- 620012, India

Tamilenthi S, Department of Earth Science, Tamil University, Thanjavur- 613 010, India

Department of Earth Science, Tamil University, Thanjavur- 613 010, India

Gurunathan M, Dept .of Computer Science and Application, Christhuraj College, Panjappur,Trichy- 620012, India

Dept .of Computer Science and Application, Christhuraj College, Panjappur,Trichy- 620012, India

Published

05-08-2012

How to Cite

Sugumar, R., T. S, and G. M. “Reveiw of Effective Data Encryption and Decryption Technique”. International Multidisciplinary Research Journal, vol. 2, no. 7, Aug. 2012, https://updatepublishing.com/journal/index.php/imrj/article/view/1624.

Issue

Section

Research Articles