Views 
   PDF Download PDF Downloads: 1012

 Open Access -   Download full article: 

Double-Reflecting Data Perturbation Method for Information Security

Maram Balajee1 and Challa Narasimham2

1part-time Scholar from Bharathiar University, Department of IT, G M R Institute of Technology, Rajam, Andhra Pradesh - 532 127, India.

2Amritha Sai Institute of Science and Technology, Vijayawada, India.

Article Publishing History
Article Received on :
Article Accepted on :
Article Published :
Article Metrics
ABSTRACT:

Information Security plays a vital role in data Communication through LAN, WAN, Internet etc. Cryptography is one of the best tools for Information Security. Cryptography is made up of two different tools that are Encryption and Decryption. Encryption is the method to hide the original data in Data Communication. While Data Communication, the data is masked using codes/shuffling. Here the purpose is to ensure privacy by keeping the information hidden/encoded to which it is not intended. When data reached destination, the encrypted data will be decrypted using some mathematical functions or decoding techniques is called Decryption. The processes are done using mathematical login, or algorithms. This paper proposes new methods for encryption and decryption by using some mathematical methods and number sequences.

KEYWORDS: cryptography; data perturbation; Fibonacci; Lucas; number sequence

Copy the following to cite this article:

Balajee M, Narasimham C. Double-Reflecting Data Perturbation Method for Information Security. Orient. J. Comp. Sci. and Technol;5(2)


Copy the following to cite this URL:

Balajee M, Narasimham C. Double-Reflecting Data Perturbation Method for Information Security. Orient. J. Comp. Sci. and Technol;5(2). Available from: http://www.computerscijournal.org/?p=2664



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.