A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 128 , Downloads: 110 | CTR: 86 % | Weekly Popularity: ⮙5

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 10, October 2017

A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer

Surya Ahuja, Nishit Angrish

This paper presents a novel technique for public-key encryption using matrices and complete random number generation. The key is encrypted on the client side and the decryption takes place subsequently on the server side. The key obtained through the method described in the paper uses mathematical operations to take care of pseudo randomness that is a characteristic of common cryptography paradigms but the conversion is efficient for a limited number of users taking part in the encrypted data transfer.

Keywords: Matrices, random numbers, Pseudo Random number, date and time variables, elliptical equation, public key cryptography

Edition: Volume 6 Issue 10, October 2017

Pages: 1778 - 1781

Share this Article

How to Cite this Article?

Surya Ahuja, Nishit Angrish, "A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20177568, Volume 6 Issue 10, October 2017, 1778 - 1781

128 PDF Views | 110 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Matrices'

Views: 146 , Downloads: 101 | CTR: 69 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2124 - 2127

Medical Image Compression Using ISPIHT & JPEG2000 Hybrid

Yashpreet Sain

Share this Article

Views: 153 , Downloads: 101 | CTR: 66 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 826 - 829

Neural Systems Approach for Ammography Finding by Utilizing Wavelet Features

A. Mallareddy, A. Priyanka

Share this Article

Views: 142 , Downloads: 102 | CTR: 72 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Views: 142 , Downloads: 108 | CTR: 76 % | Weekly Popularity: ⮙1

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1232 - 1237

An Error-Based Statistical Feature Extraction Scheme for Double JPEG Compression Detection

Nivi Varghese, Charlse M Varghese

Share this Article

Views: 128 , Downloads: 110 | CTR: 86 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1778 - 1781

A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer

Surya Ahuja, Nishit Angrish

Share this Article

Similar Articles with Keyword 'random numbers'

Views: 135 , Downloads: 105 | CTR: 78 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Views: 119 , Downloads: 109 | CTR: 92 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 5 Issue 5, May 2016

Pages: 2480 - 2485

Test Pattern Generation for Integrated Circuit Test Using Distance between Vectors

Emad Aldeen Widaat Alla Musa, Dr. Abdelrahman Elsharif Karrar, Dr. Abu Khari Bin Aain

Share this Article

Views: 127 , Downloads: 109 | CTR: 86 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1445 - 1449

Secure VoIP Network by Fusion of Irises

S. Bhuvaneshwari, Dr. P. Arul

Share this Article

Views: 128 , Downloads: 110 | CTR: 86 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1778 - 1781

A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer

Surya Ahuja, Nishit Angrish

Share this Article

Views: 116 , Downloads: 113 | CTR: 97 %

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2392 - 2395

Review on Implementation of Random Grid Visual Cryptoraphy for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Similar Articles with Keyword 'Pseudo Random number'

Views: 143 , Downloads: 107 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2814 - 2815

Partial Image Encryption Using Block Shuffling and Pseudo Random Number Generator

Rakhi Lande, Rekha Pandit

Share this Article

Views: 127 , Downloads: 109 | CTR: 86 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1445 - 1449

Secure VoIP Network by Fusion of Irises

S. Bhuvaneshwari, Dr. P. Arul

Share this Article

Views: 128 , Downloads: 110 | CTR: 86 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1778 - 1781

A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer

Surya Ahuja, Nishit Angrish

Share this Article

Views: 156 , Downloads: 117 | CTR: 75 % | Weekly Popularity: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 916 - 920

Review on Imbricate Cryptography

Bhangale Snehal Ananda, P. B. Bhalerao

Share this Article

Similar Articles with Keyword 'public key cryptography'

Views: 115 , Downloads: 105 | CTR: 91 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this Article

Views: 119 , Downloads: 106 | CTR: 89 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1934 - 1936

Trapping Unauthorized Signals in Jammer

Meena Kudande, D. C. Mehetre

Share this Article

Views: 128 , Downloads: 110 | CTR: 86 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 10, October 2017

Pages: 1778 - 1781

A Novel Message Encryption Strategy using Random Numbers for Point-To-Point Message Transfer

Surya Ahuja, Nishit Angrish

Share this Article

Views: 131 , Downloads: 111 | CTR: 85 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2086 - 2089

Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography

Anagha P. Zele, Avinash P. Wadhe

Share this Article

Views: 130 , Downloads: 115 | CTR: 88 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1495 - 1500

Verifiable Attribute-Based Through Text and Image Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Nirupama Devangaon, Dr Suvarna Nandyal

Share this Article
Top