High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Securing Cloud Data using AES Algorithm

Author(s):

R. Sunilkumarreddy , kmm institute of pg studies; JS. AnanadKumar, Kmm Institute of Pg Studies

Keywords:

Cryptography, Cipher Text, Substitution, Transposition, Caesar Cipher, Rain Fence

Abstract

As of late there may be radical advancement within the internet world. Sensitive knowledge will also be shared by way of net nevertheless this information sharing is vulnerable to targeted assaults. Cryptography used to be conversant in care for this dilemma. Cryptography is workmanship for carrying out safety by encoding the undeniable on the spot message to figure content material. Substitution and transposition are methods for encoding. On the point when Caesar figure substitution and Rail fence transposition techniques are utilized completely, figure content got is anything but problematic to separate. This discussion will introduce a viewpoint on the combination of methods substitution and transposition. Joining Caesar determine with Rail fence procedure can take out their foremost shortcoming and produce a figure message that is problematic to split.

Other Details

Paper ID: IJSRDV7I20161
Published in: Volume : 7, Issue : 2
Publication Date: 01/05/2019
Page(s): 300-303

Article Preview

Download Article