DocumentCode :
721184
Title :
Red black cryptography
Author :
Suhas, H.V. ; Malla, Reshma ; Ravi, Shambhavi
Author_Institution :
Dept. of. Inf. Sci., BMSCE, Bangalore, India
fYear :
2015
fDate :
12-13 June 2015
Firstpage :
716
Lastpage :
720
Abstract :
Cryptography is defined as the practice and study of techniques for secure communication in the presence of third party attackers. It is a good way to protect sensitive information. Over the years, the need to protect information has increased. Confidentiality is of utmost importance. Complete protection of information is not an easy task. In this paper, a method is proposed that consists of three different levels of encryption, accomplished using Red Black Trees and Linear Congruential Generator. Due to the existence of three levels, it becomes extremely difficult for an attacker to hack data.
Keywords :
cryptography; data privacy; trees (mathematics); communication security; confidentiality; data hacking; encryption; linear congruential generator; red black cryptography; red black trees; sensitive information protection; third party attackers; Ciphers; Encryption; Generators; Image color analysis; Receivers; Vegetation; Cryptography; Decryption; Encryption; Linear Congruential Generator; Red-Black Trees;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advance Computing Conference (IACC), 2015 IEEE International
Conference_Location :
Banglore
Print_ISBN :
978-1-4799-8046-8
Type :
conf
DOI :
10.1109/IADCC.2015.7154800
Filename :
7154800
Link To Document :
بازگشت