Downloads: 110 | Views: 331
Research Paper | Computer Science & Engineering | Nigeria | Volume 5 Issue 7, July 2016 | Popularity: 6.6 / 10
A Manipulated Cyclic Permutation Data Scrambling Approach for Data Security
OYINLOYE Oghenerukevwe Elohor, Benson Ojedayo
Abstract: Data sharing in every organization is a high-level priority asset. These are mostly kept electronically and exchanged via networks. The advances in technology, has made data vulnerable to manipulation and unreliable. Most techniques used to encrypt data have shown that they can be reconstructed using statistical approach with low time complexity. In this paper, a manipulated cyclic permutation system was developed for data encryption. The system performs its function by converting a plain text to cipher text and vice versa using the manipulated cyclic permutation method. The system was tested using 15 messages and showed to be 75 % reliable and resisted the guessing attack proposed by users.
Keywords: Cyclic permutation, data security, encryption, scrambling, matrix
Edition: Volume 5 Issue 7, July 2016
Pages: 2104 - 2106
DOI: https://www.doi.org/10.21275/ART2016725
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish
Downloads: 1
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021
Pages: 1126 - 1129Privacy Preserving Utility Verification of Data Published
Madhushree M
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1075 - 1080Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques
Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N