z-logo
open-access-imgOpen Access
Enhancement of Data Security using Circular Queue Based Encryption Algorithm
Author(s) -
K. Harini*,
N. Pravallika,
Sashi Rekha.K
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.l3559.1081219
Subject(s) - computer science , queue , encryption , fibonacci number , algorithm , plaintext , variable (mathematics) , ascii , computer security , computer network , mathematics , operating system , mathematical analysis , discrete mathematics
Data security is a progressing provocation for designers and Hackers. To battle different attacks by hackers, there is a need for increasingly solid security advancements. In this proposed system, a low complexity circular queue data structure security algorithm can be created. Numerous complicating variable components are used to enhance the quality of this algorithm and make recuperation of original message for hackers, becomes progressively troublesome. These tunable components are the size of the circular queue, the start of the picked keyword letter and the various portrayals of a number are in the Fibonacci manner. All letters ought to be changed over into ASCII binary configuration so as to be utilized by security algorithm in the sensible and shift operations. The outcomes demonstrate that our proposed security algorithm has half low complexity than analyzed multiple circular queues algorithm (MCQA). Fibonacci manner and variable number of difficult factors in this algorithm give adaptability in changing the security of the algorithm as per the conditions. Circular queue is an data structure can be utilized in the data security to make figured message progressively hard to disentangle. For example, a calculation that utilizes the moving and supplanting tasks of bi-section bi-push for round line to expand security. An irregular number was utilized in this algorithm to control the moving between the line and section, in the end this lead to expand the unpredictability of plaintext decrypting

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here