Data Encryption and Decryption Process using PSR Methodology and Performance Analysis with RSA
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 2 Issue 3, March 2013

Data Encryption and Decryption Process using PSR Methodology and Performance Analysis with RSA

P. Srinivasarao, B. Chaitanya, K. Venkatesh

A day-to-day use of cryptography in our life is increasing tremendously; this is because of necessity of our multimedia documents to be protected from unauthorized person. As the days are passing the old algorithms are not remained so strong as cryptanalyst are familiar with them. Today the computers are faster and in feature its speed will increase more and more. Brute force attacks are made to break the encryption and they are growing so faster. These attacks are the main drawbacks of older algorithm. But with feature this algorithms will be replaced by new techniques that will provide better protection. In this paper we are going to proposed new encryption technique which is more faster, better immune to attacks, more complex, easy to encrypt and many more advanced security feature included. This Document displays the comparison between PSR algorithm and RSA Algorithm which are used in the encryption of plaintext into cipher text that are generally used in cryptography.

Keywords: cryptography, cryptanalyst, symmetric encryption, Authentication key, RSA

Edition: Volume 2 Issue 3, March 2013

Pages: 229 - 232

Share this Article

How to Cite this Article?

P. Srinivasarao, B. Chaitanya, K. Venkatesh, "Data Encryption and Decryption Process using PSR Methodology and Performance Analysis with RSA", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSROFF2013081, Volume 2 Issue 3, March 2013, 229 - 232

66 PDF Views | 55 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 963 - 966

Quantum Mechanics and Cryptography

Shiv Kumar, Shrawan Kumar, Bimlendu Verma

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Similar Articles with Keyword 'cryptanalyst'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1507 - 1513

Encryption and Decryption Using Bit Operations

Gurubasava, Rajesh Budihal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 229 - 232

Data Encryption and Decryption Process using PSR Methodology and Performance Analysis with RSA

P. Srinivasarao, B. Chaitanya, K. Venkatesh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 549 - 553

Enhancing the Security of Playfair Square Cipher by Double Substitution and Transposition Techniques

Jawad Ahmad Dar, Amit Verma

Share this Article

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, October 2012

Pages: 5 - 9

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Share this Article

Similar Articles with Keyword 'symmetric encryption'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1000 - 1004

Survey of 3D Chaotic Map Techniques for Image Encryption

Lokesh P. Gagnani, Dr. Sunita Varjani

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1602 - 1607

SSO-Key Distribution Center Based Implementation Using Symmetric Encryption Technique for Distributed Network (Securing SSO in Distributed Network)

M Durga Prasanna, Roopa S R

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1844 - 1847

A Providing Security on Cloud Data Hadoop using Symmetric Encryption and Identity Authentication

Kale Rohitkumar Bhausaheb, R.L.Paikrao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 229 - 232

Data Encryption and Decryption Process using PSR Methodology and Performance Analysis with RSA

P. Srinivasarao, B. Chaitanya, K. Venkatesh

Share this Article

Similar Articles with Keyword 'Authentication key'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2323 - 2328

An Enhanced Anti Phishing Approach Based on Threshold Value Differentiation

Komatla. Sasikala, P. Anitha Rani

Share this Article

Research Paper, Computer Science & Engineering, Bangladesh, Volume 2 Issue 12, December 2013

Pages: 452 - 455

Reliable ECG Signals Based on GMM for Body Area Network

Ahmed Shoeb Al Hasan, Md. Hasan Tareque

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 229 - 232

Data Encryption and Decryption Process using PSR Methodology and Performance Analysis with RSA

P. Srinivasarao, B. Chaitanya, K. Venkatesh

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 3, March 2020

Pages: 631 - 634

End-End Authentication and Cryptography based on Mobile Number and Mac Address

S Shunmuga Sundaram

Share this Article

Similar Articles with Keyword 'RSA'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 759 - 761

Empirical Study of Fake Reviews Detection of Online Reviews from E-Commerce Website

Phani K. Cheruku, Atul Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 8, August 2020

Pages: 571 - 574

Second-Generation Digital Mobile Telephone Standard using a Variation of Time Division Multiple Access (TDMA)

Manjushree T L

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1303 - 1305

Obstacle Detection Technologies to Empower Visually Challenged: A Short Notes

N. Laxmi Manasa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1927 - 1931

Tehsil Wise Study and Analysis of Health Centers using GIS (Chittorgarh, Rajasthan, India)

Kawaljeet Singh B. L. Pal

Share this Article
Top