Abstract
Nowadays data plays major role in the current internet world. People generate more data through online media. The generated data are not secured properly and can easily get hacked by the hackers. To overcome from this data security issue, we have planned to apply BBRP25 technique to secure the data. BBRP22 technique has 6 phases. To apply this technique, we must follow the given below steps:1. To track down the great key S; 2. To get the Z1 & Z2 values from indivisible numbers; 3. To view as the an and b values in lattice; to find the values with the assistance k; and trade x and y values. 4. To get the T-test values and match those numbers. 5. To find the n esteem by utilizing k. 6. Apply the n values in legitimate condition; and trade x and y values. The data will be fully secured by applying BBRP22 strategy while compared to ChaCha.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.