• DocumentCode
    721184
  • Title

    Red black cryptography

  • Author

    Suhas, H.V. ; Malla, Reshma ; Ravi, Shambhavi

  • Author_Institution
    Dept. of. Inf. Sci., BMSCE, Bangalore, India
  • fYear
    2015
  • fDate
    12-13 June 2015
  • Firstpage
    716
  • Lastpage
    720
  • Abstract
    Cryptography is defined as the practice and study of techniques for secure communication in the presence of third party attackers. It is a good way to protect sensitive information. Over the years, the need to protect information has increased. Confidentiality is of utmost importance. Complete protection of information is not an easy task. In this paper, a method is proposed that consists of three different levels of encryption, accomplished using Red Black Trees and Linear Congruential Generator. Due to the existence of three levels, it becomes extremely difficult for an attacker to hack data.
  • Keywords
    cryptography; data privacy; trees (mathematics); communication security; confidentiality; data hacking; encryption; linear congruential generator; red black cryptography; red black trees; sensitive information protection; third party attackers; Ciphers; Encryption; Generators; Image color analysis; Receivers; Vegetation; Cryptography; Decryption; Encryption; Linear Congruential Generator; Red-Black Trees;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advance Computing Conference (IACC), 2015 IEEE International
  • Conference_Location
    Banglore
  • Print_ISBN
    978-1-4799-8046-8
  • Type

    conf

  • DOI
    10.1109/IADCC.2015.7154800
  • Filename
    7154800