Review on Imbricate Cryptography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 120

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016

Review on Imbricate Cryptography

Bhangale Snehal Ananda, P. B. Bhalerao

Electronic communications as internal communications tools are use by many organizations to enhance team work and to provide security. To provide a transaction in E-Business, it is important that the electronic communication has high degree of security and privacy. Protection of the data is required during data transmission and thereby there is increasing utility of network security. Parties who are exchanging sensitive and important business information in secured manner find usage of Cryptography as highly reliable. Relationship between the Randomness and Cryptography is going to be establish here. If there is higher the Randomness of predicting the next bit in cipher, higher will be the secrecy and thereby increasing the efficiency. By combining Imbricate Cryptography with the result of the Linear Congruential Pseudo Random Number Generator an algorithm is generated. This algorithm involve layered approach. Layers of Encryption and Decryption provide security. In second layer key is used, which is implanted in the message. To recover the message correct key is used. Here the message and key are inwardly plaited. One of the advantage here is that the any of the user can choose key of variable lengths so that key cannot find with permutation and combination.

Keywords: Pseudo random number, Bitmap file, Linear Congruential Generator, Imbricate cryptography, Encryption

Edition: Volume 5 Issue 3, March 2016

Pages: 916 - 920

Share this Article

How to Cite this Article?

Bhangale Snehal Ananda, P. B. Bhalerao, "Review on Imbricate Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV162006, Volume 5 Issue 3, March 2016, 916 - 920

Enter Your Email Address




Similar Articles with Keyword 'Pseudo random number'

Downloads: 111

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1445 - 1449

Secure VoIP Network by Fusion of Irises

S. Bhuvaneshwari, Dr. P. Arul

Share this Article

Downloads: 112

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2814 - 2815

Partial Image Encryption Using Block Shuffling and Pseudo Random Number Generator

Rakhi Lande, Rekha Pandit

Share this Article

Similar Articles with Keyword 'Encryption'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 9

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Similar Articles with Keyword 'Pseudo'

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Similar Articles with Keyword 'random'

Downloads: 129

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 502 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Similar Articles with Keyword 'number'

Downloads: 129

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1213 - 1218

Sentiment Analysis of Twitter Data to Analyze the Acceptance of Aadhaar

Aarushi Thakral, Vasantha W. B.

Share this Article

Similar Articles with Keyword 'Bitmap'

Downloads: 108

Research Paper, Computer Science & Engineering, Sudan, Volume 5 Issue 8, August 2016

Pages: 1167 - 1170

Image Compression Techniques Based on Transform Coding

Elhadi Amir Elhadi, Dr. Abu Obeida Mohamed Alhassan

Share this Article

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1979 - 1983

A Survey on Mining User-Aware Rare Sequential Pattern

Salmath Amina KP, Farzin Ahammed T

Share this Article

Similar Articles with Keyword 'file'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 421 - 424

Comparative Analysis of AI Techniques in the Prediction of Heart Disease

Irtiqa Dhar

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 939 - 942

A Novel Approach to Enhance Personalized Recommendation

G. Venkatesh, M. Sri Devi

Share this Article

Similar Articles with Keyword 'Linear'

Downloads: 39

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1663 - 1668

PAPR Reduction in OFDM System using Clipping and Filtering based new Hybrid VLM Pre-Coded SLM

Muneeb Manzoor Bhat, Preeti Sondhi

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Similar Articles with Keyword 'Generator'

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1567 - 1572

A Survey on the Applications of Generative Adversarial Networks

Ashish Roy, Dr. B. G. Prasad

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, Morocco, Volume 3 Issue 6, June 2014

Pages: 1777 - 1781

An Approach to Software Quality Model Based (SQuaM): (QMGenerator a Framework Supporting this Approach)

Youness BOUKOUCHI, Adil KHAMAL, Abdalaziz MARZAK, Hicham MOUTACHAOUIK

Share this Article

Similar Articles with Keyword 'cryptography'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 9

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article



Top