In this research we tried to find out a new, unique and efficient way for converting plain-text to numbers or other values which can be used both in Symmetric and Public Key Cryptography, Stenography and others related with data security. It is just a developed and highly secured model for just converting plain-text to cipher text. We proposed a new data encryption and decryption method here which can help anyone for encrypting and decrypting data more securely.
Published in | International Journal on Data Science and Technology (Volume 2, Issue 4) |
DOI | 10.11648/j.ijdst.20160204.12 |
Page(s) | 46-50 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2016. Published by Science Publishing Group |
Cryptography, Decryption, Hybrid Encryption Method, Image Processing, Plain-Text to the Cipher Text
[1] | L. Devnath, A. K Paul, M. R Islam, (2016). “A Study on Binary Number of Gender Identification Based on Fingerprints”, “International Journal of Scientific & Engineering Research, Volume 7, Issue 2, Pages 338-342. |
[2] | Liddell, H. George, Scott, Robert, Jones, H. Stuart; McKenzie, Roderick. (1984). A Greek-English Lexicon. Oxford University Press. |
[3] | Bellare, Mihir, Rogaway, Phillip. (2005). "Introduction". Introduction to Modern Cryptography Page 10, https://en.wikipedia.org/wiki/Cryptography. |
[4] | P. Kuppuswamy, Saeed Q. Y. Al-Khalidi. (2014). “Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm”, National Chengchi University & Airiti Press Inc, Vol. 19, No. 2, Pages 1-13. |
[5] | B. Adida, M. Bond, J. Clulow, A. Lin, Ross J. Anderson, and Ronald L. Rivest. (2007). On the security of the EMV secure messaging API (extended abstract). In Bruce Christianson, Bruno Crispo, James A. Malcolm, and Michael Roe, editors, Security Protocols Workshop, volume 5964 of Lecture Notes in Computer Science, Pages 147–149. Springer. |
[6] | A. Agrawal, G. Patankar. (2016). “Design of Hybrid Cryptography Algorithm for Secure Communication”, International Research Journal of Engineering and Technology, Volume: 03 Issue: 01. |
[7] | D. Harinath, M V Ramana Murthy, B Chitra. (2015). “Cryptographic Methods and Performance Analysis of Data Encryption Algorithms in Network Security”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 7. |
[8] | S. Bhati, A. Bhati, S. K. Sharma. (2012). “A New Approach towards Encryption Schemes: Byte – Rotation Encryption Algorithm”, Proceedings of the World Congress on Engineering and Computer Science, Vol II . |
[9] | D. Pointcheval, (2002). “Asymmetric Cryptography and Practical Security”, Journal of Telecommunications and Information Technology. Volume 4, Pages 41-56. |
[10] | J. M. Pollard. (July 1978). “Monte Carlo Methods for Index Computation (mod p)”, Mathematics of Computation, 32 (143), Pages 918-924. |
APA Style
Arindam Kumar Paul, Liton Devnath, Md. Rafiqul Islam. (2016). A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data. International Journal on Data Science and Technology, 2(4), 46-50. https://doi.org/10.11648/j.ijdst.20160204.12
ACS Style
Arindam Kumar Paul; Liton Devnath; Md. Rafiqul Islam. A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data. Int. J. Data Sci. Technol. 2016, 2(4), 46-50. doi: 10.11648/j.ijdst.20160204.12
AMA Style
Arindam Kumar Paul, Liton Devnath, Md. Rafiqul Islam. A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data. Int J Data Sci Technol. 2016;2(4):46-50. doi: 10.11648/j.ijdst.20160204.12
@article{10.11648/j.ijdst.20160204.12, author = {Arindam Kumar Paul and Liton Devnath and Md. Rafiqul Islam}, title = {A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data}, journal = {International Journal on Data Science and Technology}, volume = {2}, number = {4}, pages = {46-50}, doi = {10.11648/j.ijdst.20160204.12}, url = {https://doi.org/10.11648/j.ijdst.20160204.12}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijdst.20160204.12}, abstract = {In this research we tried to find out a new, unique and efficient way for converting plain-text to numbers or other values which can be used both in Symmetric and Public Key Cryptography, Stenography and others related with data security. It is just a developed and highly secured model for just converting plain-text to cipher text. We proposed a new data encryption and decryption method here which can help anyone for encrypting and decrypting data more securely.}, year = {2016} }
TY - JOUR T1 - A Highly Secured Mathematical Model for Data Encryption Using Fingerprint Data AU - Arindam Kumar Paul AU - Liton Devnath AU - Md. Rafiqul Islam Y1 - 2016/08/16 PY - 2016 N1 - https://doi.org/10.11648/j.ijdst.20160204.12 DO - 10.11648/j.ijdst.20160204.12 T2 - International Journal on Data Science and Technology JF - International Journal on Data Science and Technology JO - International Journal on Data Science and Technology SP - 46 EP - 50 PB - Science Publishing Group SN - 2472-2235 UR - https://doi.org/10.11648/j.ijdst.20160204.12 AB - In this research we tried to find out a new, unique and efficient way for converting plain-text to numbers or other values which can be used both in Symmetric and Public Key Cryptography, Stenography and others related with data security. It is just a developed and highly secured model for just converting plain-text to cipher text. We proposed a new data encryption and decryption method here which can help anyone for encrypting and decrypting data more securely. VL - 2 IS - 4 ER -