Design and implementation of high security cryptography for network applications by using bit transition encoder and decoder

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As of late, the security for any data transmission through any channel or media is significant issue because of hacking diverse strategies. Presently a day, rather than giving the security level to data, the improvement is expanded towards the commandeering of data amongst sender and beneficiary. The level of security relying upon the extent of synchronous key which is utilized for encoder and decoder handling and in existing strategies like AES, reed Solomon codes and square codes utilizes the bigger key size yet at the same time there is security issues because of hacking techniques. To address the security level and hacking issues, the novel Bit Transition Encoder and Decoder (BTED) is displayed and synchronous key is created utilizing scalar duplication which incorporates point multiplying and point expansion. The produced focuses are encoded utilizing BTED before transmission and transmitted through remote channel and the encoded information is unravels at collector utilizing BTED with converse operation. The whole novel cryptography framework has been created utilizing mat lab; the outlined framework is tried as far as speed, deferral and control and furthermore approved on Mat lab 2014a.

Cite

CITATION STYLE

APA

Indrasena Reddy, M., & Siva Kumar, A. P. (2019). Design and implementation of high security cryptography for network applications by using bit transition encoder and decoder. International Journal of Engineering and Advanced Technology, 8(6), 4476–4483. https://doi.org/10.35940/ijeat.F8994.088619

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free