Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Data Security Using Triple Encryption


Affiliations
1 Govt. P G College, Ambala, Cantt. - 133001, India
     

   Subscribe/Renew Journal


In the present work the author has suggested a unique cryptographic method where by using transposition and rotation ciphers, triple encryption (E3) is achieved. In this method, E3 is achieved by first applying the transposition cipher on the plain text and then applying rotation cipher on this transposed text. The proposed method can be applied to encrypt any data consisting of 30 or more characters. The results obtained after application of proposed algorithm are excellent and difficult to decrypt.

Keywords

Encryption, Decryption, Transposition Cipher, Rotation Cipher.
Subscription Login to verify subscription
User
Notifications
Font Size


Abstract Views: 158

PDF Views: 0




  • Data Security Using Triple Encryption

Abstract Views: 158  |  PDF Views: 0

Authors

Satish Kumar Garg
Govt. P G College, Ambala, Cantt. - 133001, India

Abstract


In the present work the author has suggested a unique cryptographic method where by using transposition and rotation ciphers, triple encryption (E3) is achieved. In this method, E3 is achieved by first applying the transposition cipher on the plain text and then applying rotation cipher on this transposed text. The proposed method can be applied to encrypt any data consisting of 30 or more characters. The results obtained after application of proposed algorithm are excellent and difficult to decrypt.

Keywords


Encryption, Decryption, Transposition Cipher, Rotation Cipher.