High Efficient Complex Parallelism for Cryptography
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Cryptography is an important in security purpose applications. This paper contributes the complex,parallelism mechanism to protect the information by using Advanced Encryption Standard (AES) Technique. AES is an encryption algorithm which uses 128 bit as a data and generates a secured data. In Encryption, when cipher key is inserted, the plain text is converted into cipher text by using complex parallelism. Similarly, in decryption, the cipher text is converted into original one by removing a cipher key. The complex parallelism technique involves the process of Substitution Byte, Shift Row, Mix Column and Add Round Key. The above four techniques are used to involve the process of shuffling the message. The complex parallelism is highly secured and the information is not broken by any other intruder.
Authors and Affiliations
H. Anusuya Baby, Christo Ananth
An Energy Efficient Dc Lighting Grid Using IOT
This paper highlights the benefits and possible drawbacks of a DC-based lighting infrastructure for powering Light Emitting Diode (LED)-lamps. It also evaluates the efforts needed for integrating the so called smart ligh...
Relational Web Wrapper: A Web Data Extraction Approach
Abstract : The information over the internet is growing at rapid rate, so web data extraction systems arerequired to extract the required information. One such technique is web wrapper, which is a supervisedlearning appr...
Wireless Controlling Of Remote Electrical Device Using Android Smartphone
Abstract: Controlling the home appliances and electronics gadgets wirelessly through SmartPhone technology can be more easy. That is, through this paper, we target to control a light emitting device (LED) from any...
DWT and P C a Based Image Enhancement with local Neighborhood filter Mask
In this letter, a new satellite image contrast enhance- ment technique based on the discrete wavelet transform (DWT) and singular value decomposition has been proposed. The tech- nique decomposes the input ima...
Unified V- Model Approach of Re-Engineering to reinforce Web Application Development
The diverse and dynamic nature of elements and techniques used to develop Web Application, due to the lack of testing technique and effective programming principles which are used for implementing basi...