##plugins.themes.academic_pro.article.main##

Abstract

In today’s data communication world info has become a lot of valuable; thence its security is very important and plays a vital role. To produce such security we tend to propose a brand new secret writing mechanism that operates on sixteen computer memory unit blocks of knowledge in 2 stages. Plaintext is split into variety of blocks and within the initial stage inner region swapping is finished on every block followed by key application. Second stages just will outer region swapping wherever 2 haphazardly designated blocks are changed for a few varieties of rounds. The essential advantage of this approach is, it uses straightforward operations and is straightforward to use, perceive and possible to design, evaluate and implement. Application and Data Security provided by this technique is also additionally high as all the operations are done supported randomness evoked by generated random values.

Keywords-- Cipher Text, Plain Text, Enciphering, Deciphering, Symmetric and Asymmetric key

##plugins.themes.academic_pro.article.details##

Author Biographies

N. Hanumantha Rao, RVR & JCCE, Chowdavaram, Guntur, AP

Assistant Professor, Department of Computer Science & Engineering,

A. Sri Nagesh, RVR & JCCE, Chowdavaram, Guntur, AP

Associate Professor, Department of Computer Science & Engineering

P. Rambabu, Nimra College of Engg. Ongole, AP

Assistant Professor, Department of Computer Science & Engineering

Dr. G.P. Saradhi Varma, SRKR Engg. College, Bhimavaram, AP

Professor, Department of Information Technology
How to Cite
Rao, N. H., Sri Nagesh, A., Rambabu, P., & Varma, D. G. S. (2015). A New Digital Encryption Scheme: Sub areas Exchange Encryption Approach. International Journal of Emerging Trends in Science and Technology, 2(02). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/505

References

1. I.Tanenbaum, AS, “Computer Networks” 2nd edition, Prentice Hall, London.1989.
2. F.Y. Li Min,(2005), ”A new class of Digital Image Scrambling Algorithm based on the method of Queue Transformation”, Computer Engineering ,01(31):148-149.
3. Stinson, D.R, “Cryptography Theory and Practice”, CRC Press, London, 1995.
4. Network Security Essentials Applications and Standards, William Stallings, Pearson Education, New Delhi.
5. Cryptography and Network Security, 2nd Edition by Atul Kahate. Tata Mc-Graw-Hill Publications, New Delhi.
6. Sunita Bhati., et al, “A New Approach towards Encryption Schemes: Byte – Rotation Encryption Algorithm”, Proceedings of the World Congress on Engineering and Computer Science, Vol II, 2012.
7. Srinagesh, A., et al. "A Modified Shape Feature Extraction Technique For Image Retrieval." International Journal of Emerging Science and Engineering (IJESE) 1 (2013).