Open Access Open Access  Restricted Access Subscription Access

Multi-Stage Encryption Using Seeded SDES


Affiliations
1 Department of Computer Science and Engineering, YSREC of Y V University, Proddatur, India
 

Now-a-days the usage of internet increases tremendously so, there is a need of security for the data. Cryptography is a process of scrambling the data into unknown format which provides security to the data. Modern cryptography is mainly based on mathematical theory and computer science practice. Cryptography process is done with the help of encryption and decryption. The basic two ideas behind the cryptography technique are substitution and transposition. This paper presents a multistage encryption algorithm. At the end of each stage an intermediate cipher is produced. The key is generated by using SEEDED SDES algorithm. Final cipher text is derived from the local binary pattern (LBP).

Keywords

Decryption, Encryption, Railference, SEEDED SDES Key Generation, Substitution, Transposition.
User
Notifications
Font Size

Abstract Views: 136

PDF Views: 5




  • Multi-Stage Encryption Using Seeded SDES

Abstract Views: 136  |  PDF Views: 5

Authors

S. Kiran
Department of Computer Science and Engineering, YSREC of Y V University, Proddatur, India
R. Pradeep Kumar Reddy
Department of Computer Science and Engineering, YSREC of Y V University, Proddatur, India
J. Venkata Sivajaya Sree
Department of Computer Science and Engineering, YSREC of Y V University, Proddatur, India
D. Naga Sravanthi
Department of Computer Science and Engineering, YSREC of Y V University, Proddatur, India

Abstract


Now-a-days the usage of internet increases tremendously so, there is a need of security for the data. Cryptography is a process of scrambling the data into unknown format which provides security to the data. Modern cryptography is mainly based on mathematical theory and computer science practice. Cryptography process is done with the help of encryption and decryption. The basic two ideas behind the cryptography technique are substitution and transposition. This paper presents a multistage encryption algorithm. At the end of each stage an intermediate cipher is produced. The key is generated by using SEEDED SDES algorithm. Final cipher text is derived from the local binary pattern (LBP).

Keywords


Decryption, Encryption, Railference, SEEDED SDES Key Generation, Substitution, Transposition.