International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016


Review on Imbricate Cryptography

Bhangale Snehal Ananda | P. B. Bhalerao [4]


Abstract: Electronic communications as internal communications tools are use by many organizations to enhance team work and to provide security. To provide a transaction in E-Business, it is important that the electronic communication has high degree of security and privacy. Protection of the data is required during data transmission and thereby there is increasing utility of network security. Parties who are exchanging sensitive and important business information in secured manner find usage of Cryptography as highly reliable. Relationship between the Randomness and Cryptography is going to be establish here. If there is higher the Randomness of predicting the next bit in cipher, higher will be the secrecy and thereby increasing the efficiency. By combining Imbricate Cryptography with the result of the Linear Congruential Pseudo Random Number Generator an algorithm is generated. This algorithm involve layered approach. Layers of Encryption and Decryption provide security. In second layer key is used, which is implanted in the message. To recover the message correct key is used. Here the message and key are inwardly plaited. One of the advantage here is that the any of the user can choose key of variable lengths so that key cannot find with permutation and combination.


Keywords: Pseudo random number, Bitmap file, Linear Congruential Generator, Imbricate cryptography, Encryption


Edition: Volume 5 Issue 3, March 2016,


Pages: 916 - 920


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Bhangale Snehal Ananda, P. B. Bhalerao, "Review on Imbricate Cryptography", International Journal of Science and Research (IJSR), Volume 5 Issue 3, March 2016, pp. 916-920, https://www.ijsr.net/get_abstract.php?paper_id=NOV162006

Similar Articles with Keyword 'Pseudo random number'

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1445 - 1449

Secure VoIP Network by Fusion of Irises

S. Bhuvaneshwari [2] | Dr. P. Arul [2]

Share this Article

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1778 - 1781

A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer

Surya Ahuja | Nishit Angrish

Share this Article
Top