Pattern Based Data Security Algorithm

Authors

  • Mansi Patel   B.E. Computer, Vadodara Institute of Engineering, Vadodara, Gujarat, India
  • Meet Patel   B.E. Computer, Vadodara Institute of Engineering, Vadodara, Gujarat, India
  • Nancy Patel   B.E. Computer, Vadodara Institute of Engineering, Vadodara, Gujarat, India
  • Ajaysinh Rathod   B.E. Computer, Vadodara Institute of Engineering, Vadodara, Gujarat, India

Keywords:

Encryption, Decryption, Plain Text, Cipher Text, Patterns, Binary Value, Decimal Value

Abstract

During the last decades, information security has become an area of concern. Encrypting and decrypting data has been widely developed because there is a demand for a highly secured data in today’s world. Encryption, is the process of changing intelligible data into unintelligible data which is unreadable by anyone except those possessing special knowledge (usually referred to as a "key") that allows them to change the information back to the original form. Encryption is important because it secures the data that you don't want anyone else to have access to. People try to protect their physical assets such as networked computers, databases, servers, etc. Encryption protects the data that lives on and between those devices. It is one of the most powerful way to keep your data safe, and while it isn’t impenetrable, it’s a major deterrent to hackers. Even if data does end up getting stolen, it will be unreadable and nearly useless if it’s encrypted. "Pattern Security" provides new encryption methodology without the use of key. The method follows the rules of pattern which is already designed by the organization. The pattern security provides three level database security. The ultimate goal of Pattern Security is Easy Encryption and Difficult Decryption.

References

  1. Swarnalata Bollavarapu and Ruchita Sharma – “Data Security using Compression and Cryptography Techniques”
  2. Sarita Kumari – “A research Paper on Cryptography Encryption and Compression Techniques”
  3. Nirmaljeet Kaur, Sukhman Sodhi – “Data Encryption Standard Algorithm (DES) for Secure Data Transmission”
  4. www.ijarcs.info/index.php/Ijarcs/article/download/1588/1576
  5. https://pdfs.semanticscholar.org/187d/26258dc57d794ce4badb094e64cf8d3f7d88.pdf
  6. www.ijsrp.org/research-paper-1301/ijsrp-p1315.pdf
  7. www.ijarcs.info/index.php/Ijarcs/article/download/2990/2973
  8. www.ijarcs.info/index.php/Ijarcs/article/download/3777/3258
  9. www.ijcscn.com/Documents/Volumes/vol1issue3/ijcscn2011010310.pdf
  10. Disha Patel, Hitarthi Hora, Prof. Ajaysinh Rathod,: Analysis of Security Threats On Data In Distributed Application, International Journal of AdvanceEngineering and Research Development, Special Issue SIEICON-2017 e-ISSN : 2348-4470, April -2017.

Downloads

Published

2018-04-10

Issue

Section

Research Articles

How to Cite

[1]
Mansi Patel, Meet Patel, Nancy Patel, Ajaysinh Rathod, " Pattern Based Data Security Algorithm, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 5, pp.449-454, March-April-2018.