International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 112

Research Paper | Information Technology | India | Volume 6 Issue 6, June 2017


An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques

Kavyashree S [3] | Manjula V [2] | Gnanashree S


Abstract: In the current world scenario, securing the data is really an important criteria for high confidentiality, integrity and authenticity. The technique which is used to attain the high confidentiality is called cryptography. As the time changes people have started to access the technology regardless of geographical conditions and time. Internet is the major source of usage for all the financial transactions. Internet is well known for providing conveniences and equally prone for causing inconveniences with respect to security issues. Therefore, internet security became important to be achieved. This paper provides the methodology to encrypt the information by the usage of three set of key values including Armstrong numbers and colors as the password. Here the input is taken in the form text message and converted to ASCII equivalents.


Keywords: Cryptography, Encryption, Decryption, RGB Color, Armstrong numbers


Edition: Volume 6 Issue 6, June 2017,


Pages: 1459 - 1462


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Kavyashree S, Manjula V, Gnanashree S, "An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 1459-1462, https://www.ijsr.net/get_abstract.php?paper_id=ART20174545

Similar Articles with Keyword 'Cryptography'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Information Technology, India, Volume 11 Issue 10, October 2022

Pages: 959 - 963

Medical Data Security using RSA and Visual Cryptography

Bency Wilson | Jesline Abraham

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Information Technology, India, Volume 12 Issue 4, April 2023

Pages: 1117 - 1121

Cryptocurrency Financial Risk Analysis using Machine Learning

Tanya Kapoor | Laxmi Ahuja

Share this Article
Top