Loading

Design and Implementation of High Security Cryptography for Network Applications by Using Bit Transition Encoder and Decoder
M. Indrasena Reddy1, A.P. Siva Kumar2

1M Indrasena reedy*, Department of Computer Science & Engineering, Research Schlor, Jawaharlal Nehru Technological University, Anantapur, India.
2Dr. A.P Siva Kumar, Department of Computer Science & Engineering, Jawaharlal Nehru Technological University, Anantapur, India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 4476-4483 | Volume-8 Issue-6, August 2019. | Retrieval Number: F8994088619/2019©BEIESP | DOI: 10.35940/ijeat.F8994.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: As of late, the security for any data transmission through any channel or media is significant issue because of hacking diverse strategies. Presently a day, rather than giving the security level to data, the improvement is expanded towards the commandeering of data amongst sender and beneficiary. The level of security relying upon the extent of synchronous key which is utilized for encoder and decoder handling and in existing strategies like AES, reed Solomon codes and square codes utilizes the bigger key size yet at the same time there is security issues because of hacking techniques. To address the security level and hacking issues, the novel Bit Transition Encoder and Decoder (BTED) is displayed and synchronous key is created utilizing scalar duplication which incorporates point multiplying and point expansion. The produced focuses are encoded utilizing BTED before transmission and transmitted through remote channel and the encoded information is unravels at collector utilizing BTED with converse operation. The whole novel cryptography framework has been created utilizing mat lab; the outlined framework is tried as far as speed, deferral and control and furthermore approved on Mat lab 2014a.
Keywords: Cryptography, ECC, Point addition, point doubling, Security system and BTED.