ABSTRACT:
In the present paper the authors have suggested a unique symmetric key cryptographic technique where three modern cipher, namely transposition cipher, rotation cipher and XOR ciphers have been used. The cipher text thus obtained is hard to crack because a teraflop super computer may need upto 3400 Years to find all possible permutations even for a plain text consisting of 10 characters.
Cite this article:
Satish Garg. Data Security using Multi-Level Encryption. Research Journal of Engineering and Technology. 2022; 13(4):100-6. doi: 10.52711/2321-581X.2022.00015
Cite(Electronic):
Satish Garg. Data Security using Multi-Level Encryption. Research Journal of Engineering and Technology. 2022; 13(4):100-6. doi: 10.52711/2321-581X.2022.00015 Available on: https://ijersonline.org/AbstractView.aspx?PID=2022-13-4-2
REFERENCES:
1. S. K. Garg, “Review of Secured Routing for Wireless Ad hoc Network”, International Journal of Computing and Business Research, 2 (1), 2011
2. S. K. Garg, “Wireless Network Security Threats”, International Journal of Information Dissemination and Technology, 1(2), 2011
3. W. Stallings, Cryptography and Network Security : Principles and Practices, 5th Edition 2005
4. T. Karygiannis and L. Owens, Wireless Communication, National Institute of Standard and Technology, U.S. Department of Computer (2001)
5. S. K. Garg, “Cryptography Using Controlled NOT Gate : Algorithm SKG 3.00”, International Journal of Electronics Engineering, 6 (1), 20-24, 2014
6. S. K. Garg, “Modified Encryption and Decryption Using Symmetric Keys at Two Stages : Algorithm SKG 1.2” , International Journal of Advance Research in Computer Science and Software Engineering , 4 (6), 778-780, 2014
7. S. K. Garg, “Encryption Scheme For Secure Routing Through Internet : Algorithm SKG 2.5”, International Journal of Informative and Futuristic Research, 2 (2), 285-289, 2014
8. S. K. Garg, A. Gaur and S. P. Gupta, “Information Security Using Modulation Technique”, International Journal Electronics and Communication Engineering and Technology, 7 (1), 107-114, 2016
9. S. K. Garg, A. Gaur and S. P. Gupta, “Data Hiding and Retrieval Using Digital Signal”, IPASJ International Journal of Electronics & Communication, 4(3), 1-5, 2016