2019
DOI: 10.30534/ijatcse/2019/90862019
|View full text |Cite
|
Sign up to set email alerts
|

Developing new Multilevel security algorithm for data encryption-decryption (MLS_ED)

Abstract: The desire of secrecy has led people to use data cryptography for effective and secure data transmission by applying advanced methods of cryptography. At the same time rival companies have invested a lot of resources to break into these encryptions, steal secrets and gain an upper hand. This research paper will introduce MLS_ED method of data encryption-decryption; this method will be implemented and compared with other existing standard methods of data cryptography. The aim of this research paper is to provid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…The result of the avalanche effect should satisfy the probability of more than 50%. Such technique is also used in subsequent studies in LBC [34], [35], [36].…”
Section: Avalanche Effectmentioning
confidence: 99%
“…The result of the avalanche effect should satisfy the probability of more than 50%. Such technique is also used in subsequent studies in LBC [34], [35], [36].…”
Section: Avalanche Effectmentioning
confidence: 99%
“…Most encryption operations depend on the use of a private secret key [5][6][7], as this key is used in the process of executing some specific operations on the secret data to generate destructive and incomprehensible data [8,9] as shown in the Figure 1. In order to generate data that is similar to the original secret data without ever losing any data or any part of it, the decryption process is carried out using the specified operations on the secret key and the encrypted data [10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…Analogously, text and audio files have also been utilised to harbour concealed data. To the unassuming observer, such text or audio manifests as entirely innocuous [14][15][16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%
“…A representation of the steganographic data model, as depicted in Figure 1, comprises the covering image, the covert message, the steganographic data method, and the resultant stego image [14][15][16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%