(3.235.45.196)
Users online: 2221    [ij] [ij] [ij] 
Email id
 

International Journal of Technology
Year : 2016, Volume : 6, Issue : 2
First page : ( 206) Last page : ( 208)
Print ISSN : 2231-3907. Online ISSN : 2231-3915.
Article DOI : 10.5958/2231-3915.2016.00031.6

Data Security Using Triple Encryption

Garg Satish Kumar*

Govt. P G College, Ambala Cantt.-133001

*Corresponding Author Email: sat.phy@gmail.com

Online published on 2 February, 2017.

Abstract

In the present work the author has suggested a unique cryptographic method where by using transposition and rotation ciphers, triple encryption (E3) is achieved. In this method, E3 is achieved by first applying the transposition cipher on the plain text and then applying rotation cipher on this transposed text. The proposed method can be applied to encrypt any data consisting of 30 or more characters. The results obtained after application of proposed algorithm are excellent and difficult to decrypt.

Top

Keywords

Encryption, Decryption, Transposition Cipher, Rotation Cipher.

Top

  
║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
437,028,367 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.