Users online: 2221    [ij] [ij] [ij] 
Email id

International Journal of Technology
Year : 2016, Volume : 6, Issue : 2
First page : ( 206) Last page : ( 208)
Print ISSN : 2231-3907. Online ISSN : 2231-3915.
Article DOI : 10.5958/2231-3915.2016.00031.6

Data Security Using Triple Encryption

Garg Satish Kumar*

Govt. P G College, Ambala Cantt.-133001

*Corresponding Author Email: sat.phy@gmail.com

Online published on 2 February, 2017.


In the present work the author has suggested a unique cryptographic method where by using transposition and rotation ciphers, triple encryption (E3) is achieved. In this method, E3 is achieved by first applying the transposition cipher on the plain text and then applying rotation cipher on this transposed text. The proposed method can be applied to encrypt any data consisting of 30 or more characters. The results obtained after application of proposed algorithm are excellent and difficult to decrypt.



Encryption, Decryption, Transposition Cipher, Rotation Cipher.


║ Site map ║ Privacy Policy ║ Copyright ║ Terms & Conditions ║ Page Rank Tool
437,028,367 visitor(s) since 30th May, 2005.
All rights reserved. Site designed and maintained by DIVA ENTERPRISES PVT. LTD..
Note: Please use Internet Explorer (6.0 or above). Some functionalities may not work in other browsers.