2007 IEEE International Conference on Granular Computing (GRC 2007) 2007
DOI: 10.1109/grc.2007.73
|View full text |Cite
|
Sign up to set email alerts
|

Data Encryption Technique Using Random Number Generator

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…To avoid the result to be guessed by combination and permutation, we can offset the result by some simple rules, as shown in the following (Chandra Sekhar, Sudha, & Prasad Reddy, 2007): In the above two equations, we offset the original result by a different methodology and apply 255 sets (1 to 255 except for 0 for convenience in calculating) of ASCII codes to position the new result. If the results of these offset operations are over 255, it will be adjusted.…”
Section: Encryption and Decryption Processmentioning
confidence: 99%
See 1 more Smart Citation
“…To avoid the result to be guessed by combination and permutation, we can offset the result by some simple rules, as shown in the following (Chandra Sekhar, Sudha, & Prasad Reddy, 2007): In the above two equations, we offset the original result by a different methodology and apply 255 sets (1 to 255 except for 0 for convenience in calculating) of ASCII codes to position the new result. If the results of these offset operations are over 255, it will be adjusted.…”
Section: Encryption and Decryption Processmentioning
confidence: 99%
“…Symmetric-key cryptography, where the same key is used both for encryption and decryption (Chandra Sekhar, Sudha, & Prasad Reddy, 2007) Coding theory is one of the most important and direct applications of information theory. It can be subdivided into source coding theory and channel coding theory.…”
Section: International Journal Of Research Studies In Computing 37mentioning
confidence: 99%
“…1) Data Encryption Technique: For the generation of random numbers a quadruple vector is used [5], [6].the quadruple vector T is generated for 4 4 values, i.e. for 0-255 ASCII values.…”
mentioning
confidence: 99%
“…[8] [9][10] is used to generate the random sequence for the 0-255 ASCII characters by multiplying r = [A]*[T] and considering the values to mod 4. The random sequence generated using the formula [40 41 42] * r is generated[6].2) Development of Cipher: Consider a plain text represented by P which is represented in the form of P= [P ij ] where i=1 to n and j=1 to n.…”
mentioning
confidence: 99%