An Application to ensure Security through Bit-level Encryption
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP

Posts: 3,541
Joined: Sep 2010
14-10-2010, 09:56 AM

Prepared by:
Mrinmoy Ghosh
Prof. Pranam Paul


This paper presents a process by which we can secure any kind of file. The newly developed encryption algorithm is presented in this paper. With help of generated distinct blocks N-level, again some distinct blocks are regenerated for (N + 1)-level. Thus, source stream or plain text, target stream or encrypted text will be generated and decrypted text will be gotten on the applying the reverse process. The algorithm can be implemented on any kind file as it is implemented in bit-level. The strength of the technique is analyzed in this paper.


Cryptography is an essential tool of data security through mathematical manipulation of data with an incomprehensible format for unauthorized person. Here a newly developed technique named, “Replacement of Cyclic Regeneration of Distinct Block (RCRDB)” is discussed. At first, plain text is decomposed into some blocks, having equal length. With help of all distinct blocks, some distinct blocks have been regenerated. The process will be continued up to a finite level of regeneration. Finally by rearrangement and replacement of all blocks in source stream or plain text, target stream or encrypted text will be generated. Hence getting source stream and the privet key, decrypted text will be gotten on the applying the reverse process.

Section 2 presents the scheme followed in the encryption technique. Section 3 describes an implementation of the technique. Section 4 presents results of executing the technique on some real files. Section 5 is an analytical discussion on the technique with a conclusion.


Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security using colors and Armstrong numbers Moiz ansari 2 170 21-10-2015, 12:10 PM
Last Post: mkaasees
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,449 31-03-2015, 09:08 AM
Last Post: Guest
  security features of atm ppt jaseelati 0 289 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 291 13-02-2015, 02:01 PM
Last Post: jaseelati
  security features of atm abstract jaseelati 0 303 17-01-2015, 04:13 PM
Last Post: jaseelati
  XML encryption full report computer science technology 7 6,672 24-03-2014, 02:31 PM
Last Post: seminar project topic
  Test case Reduction-An Experimental Analysis through Coverage Techniques seminar addict 1 705 18-03-2014, 02:37 PM
Last Post: Guest
  Karnataka ration card online application form 2013 study tips 17 17,302 07-11-2013, 03:45 PM
Last Post: Guest
  Security Framework for Wireless Communications in Smart Distribution Grid seminar tips 2 1,028 28-10-2013, 10:56 AM
Last Post: purplepearls
  E-COMPILER FOR JAVA WITH SECURITY EDITOR seminar class 18 9,991 08-10-2013, 09:07 PM
Last Post: Guest