A Manipulated Cyclic Permutation Data Scrambling Approach for Data Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110 | Views: 331

Research Paper | Computer Science & Engineering | Nigeria | Volume 5 Issue 7, July 2016 | Popularity: 6.6 / 10


     

A Manipulated Cyclic Permutation Data Scrambling Approach for Data Security

OYINLOYE Oghenerukevwe Elohor, Benson Ojedayo


Abstract: Data sharing in every organization is a high-level priority asset. These are mostly kept electronically and exchanged via networks. The advances in technology, has made data vulnerable to manipulation and unreliable. Most techniques used to encrypt data have shown that they can be reconstructed using statistical approach with low time complexity. In this paper, a manipulated cyclic permutation system was developed for data encryption. The system performs its function by converting a plain text to cipher text and vice versa using the manipulated cyclic permutation method. The system was tested using 15 messages and showed to be 75 % reliable and resisted the guessing attack proposed by users.


Keywords: Cyclic permutation, data security, encryption, scrambling, matrix


Edition: Volume 5 Issue 7, July 2016


Pages: 2104 - 2106


DOI: https://www.doi.org/10.21275/ART2016725



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
OYINLOYE Oghenerukevwe Elohor, Benson Ojedayo, "A Manipulated Cyclic Permutation Data Scrambling Approach for Data Security", International Journal of Science and Research (IJSR), Volume 5 Issue 7, July 2016, pp. 2104-2106, https://www.ijsr.net/getabstract.php?paperid=ART2016725, DOI: https://www.doi.org/10.21275/ART2016725

Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article
Top