##plugins.themes.academic_pro.article.main##
Abstract
In today’s data communication world info has become a lot of valuable; thence its security is very important and plays a vital role. To produce such security we tend to propose a brand new secret writing mechanism that operates on sixteen computer memory unit blocks of knowledge in 2 stages. Plaintext is split into variety of blocks and within the initial stage inner region swapping is finished on every block followed by key application. Second stages just will outer region swapping wherever 2 haphazardly designated blocks are changed for a few varieties of rounds. The essential advantage of this approach is, it uses straightforward operations and is straightforward to use, perceive and possible to design, evaluate and implement. Application and Data Security provided by this technique is also additionally high as all the operations are done supported randomness evoked by generated random values.
Keywords-- Cipher Text, Plain Text, Enciphering, Deciphering, Symmetric and Asymmetric key##plugins.themes.academic_pro.article.details##
References
2. F.Y. Li Min,(2005), â€A new class of Digital Image Scrambling Algorithm based on the method of Queue Transformationâ€, Computer Engineering ,01(31):148-149.
3. Stinson, D.R, “Cryptography Theory and Practiceâ€, CRC Press, London, 1995.
4. Network Security Essentials Applications and Standards, William Stallings, Pearson Education, New Delhi.
5. Cryptography and Network Security, 2nd Edition by Atul Kahate. Tata Mc-Graw-Hill Publications, New Delhi.
6. Sunita Bhati., et al, “A New Approach towards Encryption Schemes: Byte – Rotation Encryption Algorithmâ€, Proceedings of the World Congress on Engineering and Computer Science, Vol II, 2012.
7. Srinagesh, A., et al. "A Modified Shape Feature Extraction Technique For Image Retrieval." International Journal of Emerging Science and Engineering (IJESE) 1 (2013).