A Cipher Design Using Multi-Threaded Functions

!!!! Bi-Annual Double Blind Peer Reviewed Refereed Journal !!!!

!!!! Open Access Journal !!!!

Category: 
Vol8_Issue2
Author: 
B. Reddaiah, PhD Assistant Professor, YSREC of YV University
Abstract: 

Electronic communication is a primary means of transferring data from place to place where size of data is not a problem in network. Once data is released into network, straight away it opens to massive number of different on lookers with different objectives on data. In these cases it is essential to provide security for data that passes through communicational channel which is challenging and complex task. To protect data, security mechanisms are outlined as the base from which various characterized unbreakable systems are developed. Information security presents realistic approaches to protect data in communication. Cryptography deals with security and has changed its shape over the years and divided into symmetric key cryptography and asymmetric key cryptography. With more flexibility symmetric algorithms are normally used. This paper discuss about cryptography in general and particularly about symmetric cryptography. A new symmetric system is proposed which includes key generation, encryption and decryption algorithms. Finally pros and cons of proposed algorithms are discussed.

Rating: 
No votes yet