Abstract

Now a day's privacy is the main issue to sending information from one point to another in data transmission. Encryption of data is the most effective way of computer science concerned with developing schemes and formula to achieve data & information security. In its course of action, it allows sequence to be encoded in the form of cipher text where it is extremely difficult to read or recognize the codes where decryption is the procedure to transforming encoded text into the original message and information. In this paper we present an algorithm for data encryption and decryption which is based on number theory. In addition, data encryption using strange number system (especially using pentaoctagesimal (SNS) can make available physical or substantial security to information -- allowing updating only to authorized users. This algorithm is used pentaoctagesimal strange number system to encrypt data and we propose a better data encryption and decryption strategy, which will offer better security towards all possible ways of attacks while data transmission. In reference to data security, a Turing-Machine is a device based on hypothesis that manages numbers dexterously on stripe of tape according to conditions of the table. In contempt of its simplicity, Turing-Machine can be pertinent at any computer algorithm after simulating the logic that would be useful in illuminating the function of a CPU. In this research-work authors have proposed a notion that takes binary number for a given decimal number and simulate the binary number through Turing-Machine. As a result of which the next number can be generated in binary form. Further if again we calculate the decimal of the obtained binary digits, the resultant decimal number is one more than the previous decimal number. This approach would be helpful to generate next successor decimal number from a given decimal number. Further this approach of number generation through Turing machine would be helpful in cryptographic techniques where, generated number can be applied for data security enhancement at both sender as well as receiver end.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call