Author(s): Satish Garg

Email(s): sat.phy@gmail.com

DOI: 10.52711/2321-581X.2022.00015   

Address: Dr Satish Garg
Govt. College for Girls Palwal (Kurukshetra) – 136131.
*Corresponding Author

Published In:   Volume - 13,      Issue - 4,     Year - 2022


ABSTRACT:
In the present paper the authors have suggested a unique symmetric key cryptographic technique where three modern cipher, namely transposition cipher, rotation cipher and XOR ciphers have been used. The cipher text thus obtained is hard to crack because a teraflop super computer may need upto 3400 Years to find all possible permutations even for a plain text consisting of 10 characters.


Cite this article:
Satish Garg. Data Security using Multi-Level Encryption. Research Journal of Engineering and Technology. 2022; 13(4):100-6. doi: 10.52711/2321-581X.2022.00015

Cite(Electronic):
Satish Garg. Data Security using Multi-Level Encryption. Research Journal of Engineering and Technology. 2022; 13(4):100-6. doi: 10.52711/2321-581X.2022.00015   Available on: https://www.ijersonline.org/AbstractView.aspx?PID=2022-13-4-2


REFERENCES:
1.    S. K. Garg, “Review of Secured Routing for Wireless Ad hoc Network”, International Journal of Computing and Business Research, 2 (1), 2011
2.    S. K. Garg, “Wireless Network Security Threats”, International Journal of Information Dissemination and Technology, 1(2), 2011
3.    W. Stallings, Cryptography and Network Security : Principles and Practices, 5th Edition 2005
4.    T. Karygiannis and L. Owens, Wireless Communication, National Institute of Standard and Technology, U.S. Department of Computer (2001)
5.    S. K. Garg, “Cryptography Using Controlled NOT Gate : Algorithm SKG 3.00”, International Journal of Electronics Engineering, 6 (1), 20-24, 2014
6.    S. K. Garg, “Modified Encryption and Decryption Using Symmetric Keys at Two Stages : Algorithm SKG 1.2” , International Journal of Advance Research in Computer Science and Software Engineering , 4 (6), 778-780, 2014
7.    S. K. Garg, “Encryption Scheme For Secure Routing Through Internet : Algorithm SKG 2.5”, International Journal of Informative and Futuristic  Research, 2 (2), 285-289, 2014
8.    S. K. Garg, A. Gaur and S. P. Gupta, “Information Security Using Modulation Technique”, International Journal Electronics and  Communication Engineering and Technology, 7 (1), 107-114, 2016
9.    S. K. Garg, A. Gaur and S. P. Gupta, “Data Hiding and Retrieval Using Digital Signal”, IPASJ International Journal of Electronics & Communication, 4(3), 1-5, 2016

Recomonded Articles:

Author(s): Vaishnavi B. Savant, Rupali D. Kasar

DOI: 10.52711/2321-581X.2021.00019         Access: Open Access Read More

Author(s): Love Verma, Ram Nivas Giri

DOI:         Access: Open Access Read More

Author(s): Narendra K. Dewangan, Manisha Dewangan

DOI:         Access: Open Access Read More

Author(s): Narendra Kumar Dewangan, Nilmani Verma, Sandeep Gonnade

DOI:         Access: Open Access Read More

Author(s): Pratik Badala, Senthilkumar N C

DOI: 10.5958/2321-581X.2019.00008.4         Access: Open Access Read More

Author(s): T.Jaspar Vinitha Sundari, K. Karthika

DOI: 10.5958/2321-581X.2017.00051.4         Access: Open Access Read More

Author(s): Rajdeep Chowdhury, Saikat Ghosh

DOI:         Access: Open Access Read More

Author(s): Satish Garg

DOI: 10.52711/2321-581X.2022.00015         Access: Open Access Read More

Author(s): Ms. Purnima, Lalitkumar P Bhaiya, Ghanshyam Sahu

DOI: 10.52711/2321-581X.2023.00004         Access: Open Access Read More

Research Journal of Engineering and Technology (RJET) is an international, peer-reviewed, research journal aiming at promoting and publishing original high quality research in all disciplines of engineering sciences and technology....... Read more >>>

RNI: Not Available                     
DOI: 10.5958/2321-581X 


Recent Articles




Tags