Loading

Information Security Through Dual Transformation Techniques for the Unsecured Network
K.R. Sekar1, K. Saichandan Reddy2, P. Srivardhan Reddy3, G. Sathiamoorthy4, R. Vyshnavi sphoorthi5
1K.R. Sekar, School of Computing, SASTRA Deemed University, India
2K. Saichandan Reddy, School of Computing, SASTRA Deemed University, India.
3P. Srivardhan Reddy, School of Computing, SASTRA Deemed University, India.
4G. Sathiamoorthy, SASH, SASTRA Deemed University, India.
5R. Vyshnavi Sphoorthi, School of Computing, SASTRA Deemed University, India.

Manuscript received on 13 April 2019 | Revised Manuscript received on 19 May 2019 | Manuscript published on 30 May 2019 | PP: 504-507 | Volume-8 Issue-1, May 2019 | Retrieval Number: F2356037619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Background: For the past two decades, cryptography techniques and methodologies play an inevitable role in the unsecured network. Intrusions and sniffing can be prevented through the above-said cryptography. In the 20th century, the inventions of the electromagnetic and complex machines are done remarkable jobs in the field of cryptography. The famous Enigma rotor machine is used to encrypt the text and the same is difficult to break. Literally speaking cryptography is the branch of number theory needs more integral solutions. Asymmetry algorithm is mainly used in prime theory. The classical cryptography and the ciphers are to protect the secrets. Objective: The objective of the research work is to maintain security to the messages and also to keep the integrity of the message. In the research arena, umpteen numbers of methods and technologies flood all the way in the cryptography technology. Method:The proposed methodology in this work is towards mathematical ideology like Laplace and Fourier transforms. By the way of above said two methodologies forward and reverse methods adopted both in Laplace and Fourier. Results: The outcome of the work shows the greater accuracy and difficult to tap the message in the unsecured network by the intruders. Mathematical implementations adopted throughout the research paper to emphasize the research outcome of the article.
Index Terms: Cryptography, Fourier, Inverse Fourier, Intrusions and Sniffing, Inverse Laplace, Laplace.

Scope of the Article: Information and Data Security