| dc.contributor.author | Alamin-Ul –Islam, Md. | |
| dc.contributor.author | Rabiul Islam, Md. | |
| dc.contributor.author | Sany, Md Jahidul Islam | |
| dc.date.accessioned | 2020-10-10T06:30:37Z | |
| dc.date.available | 2020-10-10T06:30:37Z | |
| dc.date.issued | 2019-12-10 | |
| dc.identifier.uri | http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/4628 | |
| dc.description | Data communication technology getting more advance and more susceptible to handle huge amount of data within a short time. So data security is most important issue to maintain these data to protect any fault or harm. To protect data encryption and decryption methods are most popular and used method in now a days. There are two types of encryption and decryption: Symmetric and Asymmetric keys. They are also known as Private and Public keys encryption. In asymmetric algorithm’s both public and private key is used. [1].For encryption public keys are generally used as well as private keys used for decryption. [2]. There are various types of encryption procedure like as AES, AES-256, DES, 3DES and RSA. All of them are designed based on symmetric or asymmetric keys where some of them used both that means public keys for encryption and private keys for decryption. Example: RES. | en_US |
| dc.description.abstract | In neoteric time, network and data security has become most relevant concern because of the volume of exchange hypersensitive data over internet flourishing day by day. Many approaches are obtainable in the field of data security, one is that “Cryptography”. In cryptography, when data is transferred from sender to receiver data is encrypted by encryption algorithm and inversely when it received by the receiver it is decrypted using decrypted algorithm to view the exact and real data that send by the sender before. There are many procedure for data encryption .Such as: AES, DES, RSA algorithm. In this paper a new algorithm proposed which is CRSA (Chaotic random seed algorithm) technique for data encryption and decryption. Also compared CRSA with existing algorithms and their performance. This paper also provides experimental result to analyze those algorithms and our propose CRSA algorithm. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Daffodil International University | en_US |
| dc.subject | Cryptography | en_US |
| dc.subject | Technology | en_US |
| dc.subject | Web Applications | en_US |
| dc.subject | Computer Networks | en_US |
| dc.title | Data Encryption and Decryption with Chaotic Random Seed | en_US |
| dc.type | Other | en_US |