This paper is published in Volume-5, Issue-6, 2019
Area
Computer Science Engineering
Author
R. Arun Chakravarthy, M. Arun, N. Kaleeswari, P. Manivannan, D. Prabha
Org/Univ
KGiSL Institute of Technology, Coimbatore, Tamil Nadu, India
Keywords
Cryptosystem, Random rotation, Symmetric cryptosystem
Citations
IEEE
R. Arun Chakravarthy, M. Arun, N. Kaleeswari, P. Manivannan, D. Prabha. Framework for information management through step sequencer, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
R. Arun Chakravarthy, M. Arun, N. Kaleeswari, P. Manivannan, D. Prabha (2019). Framework for information management through step sequencer. International Journal of Advance Research, Ideas and Innovations in Technology, 5(6) www.IJARIIT.com.
MLA
R. Arun Chakravarthy, M. Arun, N. Kaleeswari, P. Manivannan, D. Prabha. "Framework for information management through step sequencer." International Journal of Advance Research, Ideas and Innovations in Technology 5.6 (2019). www.IJARIIT.com.
R. Arun Chakravarthy, M. Arun, N. Kaleeswari, P. Manivannan, D. Prabha. Framework for information management through step sequencer, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
R. Arun Chakravarthy, M. Arun, N. Kaleeswari, P. Manivannan, D. Prabha (2019). Framework for information management through step sequencer. International Journal of Advance Research, Ideas and Innovations in Technology, 5(6) www.IJARIIT.com.
MLA
R. Arun Chakravarthy, M. Arun, N. Kaleeswari, P. Manivannan, D. Prabha. "Framework for information management through step sequencer." International Journal of Advance Research, Ideas and Innovations in Technology 5.6 (2019). www.IJARIIT.com.
Abstract
Data is now commonly stored in digital format because it is the most secure way to store, manage, access and share information across networks. However, there is always a risk that unauthorized users will access data and, in the worst case, that malicious hackers will modify the data. The symmetric cryptosystem is used in the approach proposed. The symmetric cryptosystem is used in the proposed method. Data is divided into two sub-blocks and each block is encrypted to provide enhanced security using three separate secret keys. This deterministic algorithm is implemented using the LabVIEW tool. One of the three keys that diffuses the one other keys provided by the information is for misunderstanding. In the proposed solution blocks the main search attacks heavily. There are two separate secret keys used and to improve the robustness of the algorithm, random rotation is applied.