Nowadays, the computer network has changed the mode of people's communication. People can easily transfer the various information through the network. However, because of the openness of the network, people have to take more and more attention on security and confidentiality of information. Data encryption is widely use to ensure security of the data. So encryption implies a way or procedure to hide some secrets by either applying some mathematical or logical functions to a plain text to produce a text that will be difficult for some outsider to decrypt. Here we introduced a new algorithm based on symmetric key block encryption technique. In this algorithm encryption is done on binary file. Since this encryption is done on binary file ...
Today security is the important thing that we need to transfer data from location to another safely...
Image security is still one of the important fields in multimedia processing because it’s used in ou...
Cryptography technology is a security technique used to change plain text to another shape of data o...
In this paper we have developed a new symmetric key algorithm for encryption and decryption of data ...
Abstract:Information security is the process of protecting information. It protects its availability...
The new attack methods show some lacuna in the encryption algorithms and key schedule. As the streng...
This paper presents a process by which we can secure any kind of file. The newly developed encryptio...
In the era of Internet, the multimedia data can be used by anyone. There is a chance that unintended...
Today, people use widely computer networks tocommunicate from one place to another. When people usec...
n the recent years protection of information in digital form is becoming more important. Image an...
Abstract — This paper is presenting cryptography model of block based cipher technique. This model i...
Abstract — Encryption is the process of encoding messages or information in such a way that only aut...
This paper presents a substitution-based block cipher that considers a file to be encrypted as a bit...
Abstract. The encryption/decryption processes is applied to text. Both algorithms involved the use o...
This paper presents a new cryptographic technique for secured transmission of text and image data ov...
Today security is the important thing that we need to transfer data from location to another safely...
Image security is still one of the important fields in multimedia processing because it’s used in ou...
Cryptography technology is a security technique used to change plain text to another shape of data o...
In this paper we have developed a new symmetric key algorithm for encryption and decryption of data ...
Abstract:Information security is the process of protecting information. It protects its availability...
The new attack methods show some lacuna in the encryption algorithms and key schedule. As the streng...
This paper presents a process by which we can secure any kind of file. The newly developed encryptio...
In the era of Internet, the multimedia data can be used by anyone. There is a chance that unintended...
Today, people use widely computer networks tocommunicate from one place to another. When people usec...
n the recent years protection of information in digital form is becoming more important. Image an...
Abstract — This paper is presenting cryptography model of block based cipher technique. This model i...
Abstract — Encryption is the process of encoding messages or information in such a way that only aut...
This paper presents a substitution-based block cipher that considers a file to be encrypted as a bit...
Abstract. The encryption/decryption processes is applied to text. Both algorithms involved the use o...
This paper presents a new cryptographic technique for secured transmission of text and image data ov...
Today security is the important thing that we need to transfer data from location to another safely...
Image security is still one of the important fields in multimedia processing because it’s used in ou...
Cryptography technology is a security technique used to change plain text to another shape of data o...