Double Layer Cryptography using Multiplicative Cipher and Chemical Periodic Table

نویسندگان

چکیده

According to the present communication system one of main concerns is secured transformation data. In this paper we be inclined propose a two-level encryption in first level use multiplicative ciphers and Cesar cipher plain text letters, shall multiply key numbers second layer periodic table exploitation properties if quality table, thus it for encrypting decrypting same manners. For information network security will differently types like atomic no, mass IUPAC name, chemical formula, their properties.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Double Layer Security Using Visual Cryptography and Transform Based Steganography

With the recent advances in internet computing in our day to day life the need for communication has increased. Privacy in communication is desired when confidential information is shared between two parties. Mainly this project uses transform based steganography (DCT) and visual cryptography for hiding data. The proposed system provides double layer security. First level of security is achieve...

متن کامل

Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)

Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol. In particular, it specifies the use of Elliptic Curve Diffie-Hellman (E...

متن کامل

Rochford's Cipher: a Discovery in Confederate Cryptography

The "Mason and Slidell affair" played a significant role in AngloAmerican relations during the American Civil War.[1J Captured on the high seas by an energetic U.S. naval officer, James M. Mason and John Slidell, former U.S. Senators who had become envoys of the fledgling Confederacy, were subsequently released and allowed to continue on to London and Paris. There these "commissioners" provided...

متن کامل

chemical recycling of polycarbonate waste using conventional heating and microwave assisted method

پلی کربنات یکی از پلاستیکهای مهمی است که به صورت گسترده در تولید لوحهای فشرده، قطعات رایانه، مواد ساختمانی و غیره مورد استفاده قرار می گیرد. این پلیمر بصورت عمده از تراکم مونومر بیس فنولa (bpa) و کربنیل کلرید یا دی متیل کربنات ها بدست می آید. در سالهای اخیر بازیافت شیمیایی پلی کربنات بیشتر مورد توجه بوده است. بازیافت شیمیایی پلی کربنات برای بدست آوردن مواد اولیه آن با روشهای متفاوتی مانند تجزی...

Stream Cipher and Block Cipher Based Performance Analysis of Symmetric Cryptography Algorithms: AES and DES

Dr. Preeti Mehta, Ms. Monika Bansal, Ms. Akanksha Upadhyaya 1, 2, 3 Department of MCA, Rukmini Devi Institute of Advanced Studies Abstract— Security and risk management are considered to be data centric. Data, systems and network can be protected for three possible outcomes: confidentiality, integrity and availability. In today’s scenario security of data has become an important issue. Most of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Journal of Data Communication and Networking (IJDCN)

سال: 2021

ISSN: ['2582-760X']

DOI: https://doi.org/10.54105/ijdcn.b5008.041221