0% found this document useful (0 votes)
55 views

A New Hybrid Technique For Data Encryption

A paper proposes a new hybrid data encryption technique that combines the advantages of existing encryption methods. The technique divides a message into three parts and encrypts each part using a different method like Fibonacci series, XOR logic, or PN sequence. It uses two keys, a segmenting key to divide the message and an encrypting key, to provide authentication and validation. The paper analyzes and compares the performance of encrypting message parts with different techniques to form the basis of the new hybrid encryption method.
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

A New Hybrid Technique For Data Encryption

A paper proposes a new hybrid data encryption technique that combines the advantages of existing encryption methods. The technique divides a message into three parts and encrypts each part using a different method like Fibonacci series, XOR logic, or PN sequence. It uses two keys, a segmenting key to divide the message and an encrypting key, to provide authentication and validation. The paper analyzes and compares the performance of encrypting message parts with different techniques to form the basis of the new hybrid encryption method.
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

A new hybrid technique for data encryption

Data encryption has been widely applied in many data processing areas. Various
encryption algorithms have been developed for processing text documents,
images, video, etc. If we are able to collaborate the advantages of the different
existing encryption methods, then a new hybrid encryption method can be
developed which offers better security and protection. So, in order to
accomplish the Hybrid encryption technique, data encryption techniques using
Fibonacci series, XOR logic, PN sequence are studied, analyzed and their
performance is compared in this paper. The message is divided into three parts
and these three different techniques are applied to these parts and the
performance is again analyzed. The application of these three different methods
to different parts of the same message along with two keys, namely, segmenting
key and encrypting key to provide further authentication and validation is the
basis of our paper.

Modules

 Encrypt-Here the secret message to share is divided and encrypted using


Fibonacci series, XOR logic, PN sequence.
 Decrypt- Here the secret message is divided and decrypted using
Fibonacci series, XOR logic, PN sequence.

Advantages

 The message is secured as it is divided and then each part of the message
is encrypted using different encryption algorithm.
 2 keys are used which enhances the level of security.

Application

This can be used in any application dealing with exchange of secret messages.

You might also like