International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 119

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014


Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique

Sajjade Zeba-Shazesh | Aruna K. Gupta [2]


Abstract: Encryption is the process where data or information is turned into cipher text then we coded it, so that it cannot be understood to unauthorized access. Once the message has been encrypted it is not possible for a person to read it though he or she possesses knowledge to decrypt the data by using key. The main objective is to use multirotational technique instead of linear rotational technique by using circular substitution and reversal transposition is to exploited the benefit of both confusion and diffusion, also we study coding and decoding of algorithm to implement successful crypto system by using symmetric poly alphabetic cipher for image cryptography and data compression technique using key length modification. Users authentication procedures will be design for data storage and retrieval. The user text file will be secured using Hybrid Cryptosystem before storing in network and building secure communication channel for text based files transmission and improve performance between client and server by reducing communication time. For this, we propose a method for secure text based files storage and secure text based files retrieval in network by using the Hybrid Cryptosystem. It provides two tier security using Vigenere cipher and reverse circle cipher with symmetric key multi rotational technique.


Keywords: Buffer Size, Cipher text, Data Encryption, Data Decryption, Network Security


Edition: Volume 3 Issue 7, July 2014,


Pages: 964 - 968


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Sajjade Zeba-Shazesh, Aruna K. Gupta, "Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 964-968, https://www.ijsr.net/get_abstract.php?paper_id=20141180

Similar Articles with Keyword 'Buffer Size'

Downloads: 127

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 404 - 410

An Approach of Analysis of Data Centers in Cloud by Dividing the Response Time

Preeti Kamble | Amar Buchade [2]

Share this Article

Downloads: 135 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 170 - 174

A Survey on Performance Analysis of DES; AES and RSA Algorithm along with LSB Substitution Technique

B. Padmavathi [3] | S. Ranjitha Kumari

Share this Article
Top