Open Access
Subscription Access
Double-reflecting Data Perturbation Method for Information Security
Information Security plays a vital role in data Communication through LAN, WAN, Internet etc. Cryptography is one of the best tools for Information Security. Cryptography is made up of two different tools that are Encryption and Decryption. Encryption is the method to hide the original data in Data Communication. While Data Communication, the data is masked using codes/shuffling. Here the purpose is to ensure privacy by keeping the information hidden/encoded to which it is not intended. When data reached destination, the encrypted data will be decrypted using some mathematical functions or decoding techniques is called Decryption. The processes are done using mathematical login, or algorithms. This paper proposes new methods for encryption and decryption by using some mathematical methods and number sequences.
Keywords
Cryptography, Data Perturbation, Fibonacci, Lucas, Number Sequence.
User
Font Size
Information
Abstract Views: 215
PDF Views: 0