Views: 128 , Downloads: 110 | CTR: 86 % | Weekly Popularity: ⮙5
Research Paper | Computer Science & Engineering | India | Volume 6 Issue 10, October 2017
A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer
Surya Ahuja, Nishit Angrish
This paper presents a novel technique for public-key encryption using matrices and complete random number generation. The key is encrypted on the client side and the decryption takes place subsequently on the server side. The key obtained through the method described in the paper uses mathematical operations to take care of pseudo randomness that is a characteristic of common cryptography paradigms but the conversion is efficient for a limited number of users taking part in the encrypted data transfer.
Keywords: Matrices, random numbers, Pseudo Random number, date and time variables, elliptical equation, public key cryptography
Edition: Volume 6 Issue 10, October 2017
Pages: 1778 - 1781
How to Cite this Article?
Surya Ahuja, Nishit Angrish, "A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20177568, Volume 6 Issue 10, October 2017, 1778 - 1781
128 PDF Views | 110 PDF Downloads
Similar Articles with Keyword 'Matrices'
Views: 146 , Downloads: 101 | CTR: 69 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2124 - 2127Medical Image Compression Using ISPIHT & JPEG2000 Hybrid
Yashpreet Sain
Views: 153 , Downloads: 101 | CTR: 66 % | Weekly Popularity: ⮙4
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 826 - 829Neural Systems Approach for Ammography Finding by Utilizing Wavelet Features
A. Mallareddy, A. Priyanka
Views: 142 , Downloads: 102 | CTR: 72 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2535 - 2538A Survey on Security Mechanism using Colors and Armstrong Numbers
Nutan Gurav, Pratap Singh
Views: 142 , Downloads: 108 | CTR: 76 % | Weekly Popularity: ⮙1
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1232 - 1237An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection
Nivi Varghese, Charlse M Varghese
Views: 128 , Downloads: 110 | CTR: 86 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017
Pages: 1778 - 1781A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer
Surya Ahuja, Nishit Angrish
Similar Articles with Keyword 'random numbers'
Views: 135 , Downloads: 105 | CTR: 78 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2545 - 2549Implementation of Random Grid Visual Cryptography for Color Images
Snehal N. Meshram, Sneha U. Bohra
Views: 119 , Downloads: 109 | CTR: 92 % | Weekly Popularity: ⮙4
Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 5 Issue 5, May 2016
Pages: 2480 - 2485Test Pattern Generation for Integrated Circuit Test Using Distance between Vectors
Emad Aldeen Widaat Alla Musa, Dr. Abdelrahman Elsharif Karrar, Dr. Abu Khari Bin Aain
Views: 127 , Downloads: 109 | CTR: 86 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017
Pages: 1445 - 1449Secure VoIP Network by Fusion of Irises
S. Bhuvaneshwari, Dr. P. Arul
Views: 128 , Downloads: 110 | CTR: 86 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017
Pages: 1778 - 1781A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer
Surya Ahuja, Nishit Angrish
Views: 116 , Downloads: 113 | CTR: 97 %
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 2392 - 2395Review on Implementation of Random Grid Visual Cryptoraphy for Color Images
Snehal N. Meshram, Sneha U. Bohra
Similar Articles with Keyword 'Pseudo Random number'
Views: 143 , Downloads: 107 | CTR: 75 % | Weekly Popularity: ⮙2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2814 - 2815Partial Image Encryption Using Block Shuffling and Pseudo Random Number Generator
Rakhi Lande, Rekha Pandit
Views: 127 , Downloads: 109 | CTR: 86 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017
Pages: 1445 - 1449Secure VoIP Network by Fusion of Irises
S. Bhuvaneshwari, Dr. P. Arul
Views: 128 , Downloads: 110 | CTR: 86 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017
Pages: 1778 - 1781A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer
Surya Ahuja, Nishit Angrish
Views: 156 , Downloads: 117 | CTR: 75 % | Weekly Popularity: ⮙4
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 916 - 920Review on Imbricate Cryptography
Bhangale Snehal Ananda, P. B. Bhalerao
Similar Articles with Keyword 'public key cryptography'
Views: 115 , Downloads: 105 | CTR: 91 % | Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1952 - 1957Navigation Query Security through Privacy Preservation and Cryptography in VANETs
Anuradha T, Saba Tahseen
Views: 119 , Downloads: 106 | CTR: 89 % | Weekly Popularity: ⮙2
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1934 - 1936Trapping Unauthorized Signals in Jammer
Meena Kudande, D. C. Mehetre
Views: 128 , Downloads: 110 | CTR: 86 % | Weekly Popularity: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017
Pages: 1778 - 1781A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer
Surya Ahuja, Nishit Angrish
Views: 131 , Downloads: 111 | CTR: 85 % | Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2086 - 2089Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography
Anagha P. Zele, Avinash P. Wadhe
Views: 130 , Downloads: 115 | CTR: 88 % | Weekly Popularity: ⮙3
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017
Pages: 1495 - 1500Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
Nirupama Devangaon, Dr Suvarna Nandyal