DSpace Repository

Data Encryption and Decryption with Chaotic Random Seed

Show simple item record

dc.contributor.author Alamin-Ul –Islam, Md.
dc.contributor.author Rabiul Islam, Md.
dc.contributor.author Sany, Md Jahidul Islam
dc.date.accessioned 2020-10-10T06:30:37Z
dc.date.available 2020-10-10T06:30:37Z
dc.date.issued 2019-12-10
dc.identifier.uri http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/4628
dc.description Data communication technology getting more advance and more susceptible to handle huge amount of data within a short time. So data security is most important issue to maintain these data to protect any fault or harm. To protect data encryption and decryption methods are most popular and used method in now a days. There are two types of encryption and decryption: Symmetric and Asymmetric keys. They are also known as Private and Public keys encryption. In asymmetric algorithm’s both public and private key is used. [1].For encryption public keys are generally used as well as private keys used for decryption. [2]. There are various types of encryption procedure like as AES, AES-256, DES, 3DES and RSA. All of them are designed based on symmetric or asymmetric keys where some of them used both that means public keys for encryption and private keys for decryption. Example: RES. en_US
dc.description.abstract In neoteric time, network and data security has become most relevant concern because of the volume of exchange hypersensitive data over internet flourishing day by day. Many approaches are obtainable in the field of data security, one is that “Cryptography”. In cryptography, when data is transferred from sender to receiver data is encrypted by encryption algorithm and inversely when it received by the receiver it is decrypted using decrypted algorithm to view the exact and real data that send by the sender before. There are many procedure for data encryption .Such as: AES, DES, RSA algorithm. In this paper a new algorithm proposed which is CRSA (Chaotic random seed algorithm) technique for data encryption and decryption. Also compared CRSA with existing algorithms and their performance. This paper also provides experimental result to analyze those algorithms and our propose CRSA algorithm. en_US
dc.language.iso en en_US
dc.publisher Daffodil International University en_US
dc.subject Cryptography en_US
dc.subject Technology en_US
dc.subject Web Applications en_US
dc.subject Computer Networks en_US
dc.title Data Encryption and Decryption with Chaotic Random Seed en_US
dc.type Other en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account

Statistics