International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 112

Research Paper | Information Technology | India | Volume 6 Issue 6, June 2017


An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques

Kavyashree S [3] | Manjula V [2] | Gnanashree S


Abstract: In the current world scenario, securing the data is really an important criteria for high confidentiality, integrity and authenticity. The technique which is used to attain the high confidentiality is called cryptography. As the time changes people have started to access the technology regardless of geographical conditions and time. Internet is the major source of usage for all the financial transactions. Internet is well known for providing conveniences and equally prone for causing inconveniences with respect to security issues. Therefore, internet security became important to be achieved. This paper provides the methodology to encrypt the information by the usage of three set of key values including Armstrong numbers and colors as the password. Here the input is taken in the form text message and converted to ASCII equivalents.


Keywords: Cryptography, Encryption, Decryption, RGB Color, Armstrong numbers


Edition: Volume 6 Issue 6, June 2017,


Pages: 1459 - 1462


How to Cite this Article?

Kavyashree S, Manjula V, Gnanashree S, "An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 1459-1462, https://www.ijsr.net/get_abstract.php?paper_id=ART20174545

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Cryptography'

Downloads: 9 | Monthly Hits: ⮙1

Informative Article, Information Technology, India, Volume 10 Issue 7, July 2021

Pages: 63 - 81

Introduction to Cryptography

Bhavna Khosla [2]

Share this Article

Downloads: 105

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum [2] | Y.B.Gurav [3]

Share this Article


Top