ENCRYPTION METHOD USING PASCAL’S TRIANGLE BASED SUBSTITUTION AND SIERPINSKI TRIANGLE BASED PERMUTATION

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 13

Abstract

Text messages are often created, shared and a person sends at least ten messages a day. Because of its frequent usage those messages are not been encrypted. Thus it is unable to send confidential messages via SMS service. In this paper, we develop a new encryption technique using the notions of Pascals Triangle and Sierpinski Triangle. The proposed method uses the Pascals triangle for substitution and Sierpinski triangle for permutation. The method is simple and easy to implement in real time. It is difficult for the attackers to predict the original message contained in the ciphertext. The proposed method is not much vulnerable to brute force and letter frequency attacks.

Authors and Affiliations

Sivakumar T, Pauvithraa K. T, Durga Devi V

Keywords

Related Articles

Identifying Network Anomalies Using Clustering Technique in Weblog Data

In this paper we present an approach for identifying networkanomalies by visualizing network flow data which is stored inweblogs. Various clustering techniques can be used to identifydifferent anomalies in the network. H...

ENHANCED CBIR MECHANISM USING STEERABLE PYRAMID AND MEDIAN VECTOR ALGORITHM

Recently, digital content has become a significant and inevitable asset of or any enterprise and the need for visual content management is on the rise as well. Content-based image retrieval has attracted voluminous resea...

MVICS: a Repository and Search Tool towards Holistic Semantic-Based Precise Component Selection

Driven by the continuous expansions of software applications and the increases in component varieties and sizes, the so-called component mismatch problem has become a more severe hurdle for component selection and integr...

Automated Blood Cells Extraction and counting

Automated blood cells extraction and counting in medical images is an important and sometimes necessary procedure in medical diagnostics and treatment. In this paper an automated blood cells extraction and counting metho...

3-D from 2-D Using Warping Transformations .

Shown in this paper are methods on how to find the third dimension of a single image or from the two views of the image taking in a different angle using the method more accurate and faster to get to the third dimension...

Download PDF file
  • EP ID EP650893
  • DOI 10.24297/ijct.v15i13.4806
  • Views 104
  • Downloads 0

How To Cite

Sivakumar T, Pauvithraa K. T, Durga Devi V (2016). ENCRYPTION METHOD USING PASCAL’S TRIANGLE BASED SUBSTITUTION AND SIERPINSKI TRIANGLE BASED PERMUTATION. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 15(13), 7362-7367. https://www.europub.co.uk/articles/-A-650893