Abstract

Today data transmission is very important through different channels. Need of network security comes to secure data transformation from one network to another network. As the complexity of the systems and the networks increases, weakness expands and the task of securing the networks is becomes more convoluted. Duty of securing is done by Cryptography techniques. A colossal amount of data is exchanged over public networks like the internet due to immense accommodation. This includes personal details and confidential information. It is important to prevent the data from falling into the wrong hands. So, due to this factor we use cryptography. Encryption and decryption are the basic terms that are used in cryptography. There are few algorithms which used including, AES (Advanced Encryption Standard), DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard) and BLOWFISH. The main contribution of this paper is to provide an algorithm that is useful for data transformation in cognitive radio networks. In this research, we have drawn a new symmetric key technique that is for the usage of cryptography which is helpful to make the data saved from others.

Highlights

  • INTRODUCTIONEchnology now-a-days is common in our Tsurroundings. With the passage of time, the transformation of data is increasing day by day information into an unintelligible text using a suitable encryption technique so that it cannot be understood by any unintended individual, and converting it back and maintaining an old data in a system has gradually to its original form for the intended receiver using some increases

  • Today data transmission is very important through different channels

  • Echnology now-a-days is common in our Tsurroundings

Read more

Summary

INTRODUCTION

Echnology now-a-days is common in our Tsurroundings. With the passage of time, the transformation of data is increasing day by day information into an unintelligible text using a suitable encryption technique so that it cannot be understood by any unintended individual, and converting it back and maintaining an old data in a system has gradually to its original form for the intended receiver using some increases. Cryptography has become an essential tool in protecting the sensitive information from unauthorized access and to provide information security. This technique has discovered its uses in defence and in business field. To get plain text again on the receiving end, some specific operation are performed between cipher text and key This study explores the new technique of encryption and data transmission in network. Mehran University Research Journal of Engineering & Technology, Volume 38, No 3, July, 2019 [p-ISSN: 0254-7821, e-ISSN: 2413-7219] 610

Symmetric Encryption
Related Work and PopularAlgorithms
ISSUES FOUND IN ALGORITHMS
PROPOSED ALGORITHM
EXPERIMENTAL FINDINGS OF ALGORITHM
Testing Results by Using HP G3450
Testing Results by using HP1000
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call