DocumentCode
721184
Title
Red black cryptography
Author
Suhas, H.V. ; Malla, Reshma ; Ravi, Shambhavi
Author_Institution
Dept. of. Inf. Sci., BMSCE, Bangalore, India
fYear
2015
fDate
12-13 June 2015
Firstpage
716
Lastpage
720
Abstract
Cryptography is defined as the practice and study of techniques for secure communication in the presence of third party attackers. It is a good way to protect sensitive information. Over the years, the need to protect information has increased. Confidentiality is of utmost importance. Complete protection of information is not an easy task. In this paper, a method is proposed that consists of three different levels of encryption, accomplished using Red Black Trees and Linear Congruential Generator. Due to the existence of three levels, it becomes extremely difficult for an attacker to hack data.
Keywords
cryptography; data privacy; trees (mathematics); communication security; confidentiality; data hacking; encryption; linear congruential generator; red black cryptography; red black trees; sensitive information protection; third party attackers; Ciphers; Encryption; Generators; Image color analysis; Receivers; Vegetation; Cryptography; Decryption; Encryption; Linear Congruential Generator; Red-Black Trees;
fLanguage
English
Publisher
ieee
Conference_Titel
Advance Computing Conference (IACC), 2015 IEEE International
Conference_Location
Banglore
Print_ISBN
978-1-4799-8046-8
Type
conf
DOI
10.1109/IADCC.2015.7154800
Filename
7154800
Link To Document