Conference Proceeding

Mathematics in Space and Applied Sciences (ICMSAS-2023)
ICMSAS-2023

Subject Area: Mathematics
Pages: 331
Published On: 03-Mar-2023
Online Since: 04-Mar-2023

 Read More >>

Author(s): Satish Garg

Email(s): sat.phy@gmail.com

Address: Dr Satish Garg
Govt. College for Girls Palwal (Kurukshetra) - 136131
*Corresponding Author

Published In:   Conference Proceeding, Mathematics in Space and Applied Sciences (ICMSAS-2023)

Year of Publication:  March, 2023

Online since:  March 04, 2023

DOI: Not Available

ABSTRACT:
In the present paper the authors have suggested a unique symmetric key cryptographic technique where three modern cipher, namely transposition cipher, rotation cipher and XOR ciphers have been used. The cipher text thus obtained is hard to crack because a teraflop super computer may need upto 3400 Years to find all possible permutations even for a plain text consisting of 10 characters.


Cite this article:
Satish Garg. Data Security using Multi-Level Encryption. Proceedings of 2nd International Conference on Mathematics in Space and Applied Sciences. 2023;1:268-274.


REFERENCES:

1.     S. K. Garg, “Review of Secured Routing for Wireless Ad hoc Network”, International Journal of Computing and Business Research, 2 (1), 2011

2.     S. K. Garg, “Wireless Network Security Threats”, International Journal of Information Dissemination and Technology, 1(2), 2011

3.     W. Stallings, Cryptography and Network Security : Principles and Practices, 5th Edition 2005

4.     T. Karygiannis and L. Owens, Wireless Communication, National Institute of Standard and Technology, U.S. Department of Computer (2001)

5.     S. K. Garg, “Cryptography Using Controlled NOT Gate : Algorithm SKG 3.00”, International Journal of Electronics Engineering, 6 (1), 20-24, 2014

6.     S. K. Garg, “Modified Encryption and Decryption Using Symmetric Keys at Two Stages : Algorithm SKG 1.2” , International Journal of Advance Research in Computer Science and Software Engineering , 4 (6), 778-780, 2014

7.     S. K. Garg, “Encryption Scheme For Secure Routing Through Internet : Algorithm SKG 2.5”, International Journal of Informative and Futuristic  Research, 2 (2), 285-289, 2014

8.     S. K. Garg, A. Gaur and S. P. Gupta, “Information Security Using Modulation Technique”, International Journal Electronics and  Communication Engineering and Technology, 7 (1), 107-114, 2016

9.     S. K. Garg, A. Gaur and S. P. Gupta, “Data Hiding and Retrieval Using Digital Signal”, IPASJ International Journal of Electronics & Communication, 4(3), 1-5, 2016





Author/Editor Information

Dr. Sanjay Kango

Department of Mathematics, Neta Ji Subhash Chander Bose Memorial, Government Post Graduate College, Hamirpur Himachal Pradesh-177 005, INDIA