Pattern Based Data Security Algorithm

Authors(4) :-Mansi Patel, Meet Patel, Nancy Patel, Ajaysinh Rathod

During the last decades, information security has become an area of concern. Encrypting and decrypting data has been widely developed because there is a demand for a highly secured data in todayís world. Encryption, is the process of changing intelligible data into unintelligible data which is unreadable by anyone except those possessing special knowledge (usually referred to as a "key") that allows them to change the information back to the original form. Encryption is important because it secures the data that you don't want anyone else to have access to. People try to protect their physical assets such as networked computers, databases, servers, etc. Encryption protects the data that lives on and between those devices. It is one of the most powerful way to keep your data safe, and while it isnít impenetrable, itís a major deterrent to hackers. Even if data does end up getting stolen, it will be unreadable and nearly useless if itís encrypted. "Pattern Security" provides new encryption methodology without the use of key. The method follows the rules of pattern which is already designed by the organization. The pattern security provides three level database security. The ultimate goal of Pattern Security is Easy Encryption and Difficult Decryption.

Authors and Affiliations

Mansi Patel
B.E. Computer, Vadodara Institute of Engineering, Vadodara, Gujarat, India
Meet Patel
B.E. Computer, Vadodara Institute of Engineering, Vadodara, Gujarat, India
Nancy Patel
B.E. Computer, Vadodara Institute of Engineering, Vadodara, Gujarat, India
Ajaysinh Rathod
B.E. Computer, Vadodara Institute of Engineering, Vadodara, Gujarat, India

Encryption, Decryption, Plain Text, Cipher Text, Patterns, Binary Value, Decimal Value

  1. Swarnalata Bollavarapu and Ruchita Sharma Ė “Data Security using Compression and Cryptography Techniques”
  2. Sarita Kumari Ė “A research Paper on Cryptography Encryption and Compression Techniques”
  3. Nirmaljeet Kaur, Sukhman Sodhi Ė “Data Encryption Standard Algorithm (DES) for Secure Data Transmission”
  4. www.ijarcs.info/index.php/Ijarcs/article/download/1588/1576
  5. https://pdfs.semanticscholar.org/187d/26258dc57d794ce4badb094e64cf8d3f7d88.pdf
  6. www.ijsrp.org/research-paper-1301/ijsrp-p1315.pdf
  7. www.ijarcs.info/index.php/Ijarcs/article/download/2990/2973
  8. www.ijarcs.info/index.php/Ijarcs/article/download/3777/3258
  9. www.ijcscn.com/Documents/Volumes/vol1issue3/ijcscn2011010310.pdf
  10. Disha Patel, Hitarthi Hora, Prof. Ajaysinh Rathod,: Analysis of Security Threats On Data In Distributed Application, International Journal of AdvanceEngineering and Research Development, Special Issue SIEICON-2017 e-ISSN : 2348-4470, April -2017.

Publication Details

Published in : Volume 4 | Issue 5 | March-April 2018
Date of Publication : 2018-04-10
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 449-454
Manuscript Number : CI048
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Mansi Patel, Meet Patel, Nancy Patel, Ajaysinh Rathod, " Pattern Based Data Security Algorithm, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 5, pp.449-454, March-April.2018
URL : http://ijsrset.com/CI048

Follow Us

Contact Us