Downloads: 114 | Views: 123
Research Paper | Electronics & Communication Engineering | India | Volume 5 Issue 12, December 2016
Low Latency for File Encryption and Decryption Using BRA Algorithm for Secure Transmission of Data
Kalyani V. Gulhane | Prof. G. D. Dalvi 
Abstract: The need of reliable and effective security mechanisms to protect information systems is increasing due to the rising magnitude of identity theft in our society. Cryptography involves various techniques for taking user data, readable data, and transforming it into unintelligible form, for the secure transmission over the network, and then using a key to transform it back into readable data when it reaches its destination. The main aim of this study is to increase security in communication by encrypting the information using a key that is created through using an image. Often information security is major obstacle in different areas like bank, transaction, military, network application. Whenever we want to send file from one location to another location in the network, many unauthorized users are illegally access the information. There are different algorithms like Blowfish, DES, AES, RC5 that achieve more security but increases the complexity of the algorithm and also takes more time for encryption and decryption of files. Our algorithm proposes a method for low latency encryption-decryption algorithm that will take smallest amount of time for file encryption and decryption and provide more security. This algorithm can be applied on different types of files. In Byte Rotation Algorithm a random key generation technique is used.
Keywords: Byte Rotation Algorithm, Encryption time, Decryption time, Key generation, Parallel process
Edition: Volume 5 Issue 12, December 2016,
Pages: 1531 - 1535
Similar Articles with Keyword 'Key generation'
Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015Pages: 2200 - 2202
Security Enhanced RDH Image Steganography by RRBE
Saranya.M | Aswani.K
Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015Pages: 1350 - 1355
Implementation, Simulation and Synthesis of RSA Cryptosystem
Rafeek Alas | Dr. Kiran Bailey