Deeshen Dhirendra Shah - Academia.edu (original) (raw)

Uploads

Papers by Deeshen Dhirendra Shah

Research paper thumbnail of An Encryption Algorithm for Secure Data Transmission

International Journal of Computer Applications, 2012

Encryption is of prime importance when confidential data is transmitted over the network. Varied ... more Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. We have proposed a new algorithm based on the concept used by Rijmen and Daemen (Rijndael algorithm), the founders of AES algorithm. The proposed algorithm encrypts and decrypts two 128 bits data simultaneously i.e. 256 bits data, thus providing strong encryption accompanied with complex processing. The proposed Feistal algorithm uses various invertible, self-invertible, and non-invertible components of modern encryption ciphers and key generation same as that of AES. This algorithm provides a secure, fast, and strong encryption of the data. There is a huge amount of confusion and diffusion of the data during encryption which makes it very difficult for an attacker to interpret the encryption pattern and the plain text form of the encrypted data. The proposed algorithm is also resistant to Brute-Force and pattern attacks.

Research paper thumbnail of Personality Trait Generation using Web Search Query Log

International Journal of Computer …, 2012

The involvement of Internet technology into the day-to-day life of every individual is very much ... more The involvement of Internet technology into the day-to-day life of every individual is very much evident from the fact that the number of users accessing World Wide Web's massive source of information has been increasing exponentially. Access to such ...

Research paper thumbnail of An Encryption Algorithm for Secure Data Transmission

International Journal of Computer Applications, Feb 29, 2012

Encryption is of prime importance when confidential data is transmitted over the network. Varied ... more Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. We have proposed a new algorithm based on the concept used by Rijmen and Daemen (Rijndael algorithm), the founders of AES algorithm. The proposed algorithm encrypts and decrypts two 128 bits data simultaneously i.e. 256 bits data, thus providing strong encryption accompanied with complex processing. The proposed Feistal algorithm uses various invertible, self-invertible, and non-invertible components of modern encryption ciphers and key generation same as that of AES. This algorithm provides a secure, fast, and strong encryption of the data. There is a huge amount of confusion and diffusion of the data during encryption which makes it very difficult for an attacker to interpret the encryption pattern and the plain text form of the encrypted data. The proposed algorithm is also resistant to Brute-Force and pattern attacks.

Research paper thumbnail of An Encryption Algorithm for Secure Data Transmission

International Journal of Computer Applications, 2012

Encryption is of prime importance when confidential data is transmitted over the network. Varied ... more Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. We have proposed a new algorithm based on the concept used by Rijmen and Daemen (Rijndael algorithm), the founders of AES algorithm. The proposed algorithm encrypts and decrypts two 128 bits data simultaneously i.e. 256 bits data, thus providing strong encryption accompanied with complex processing. The proposed Feistal algorithm uses various invertible, self-invertible, and non-invertible components of modern encryption ciphers and key generation same as that of AES. This algorithm provides a secure, fast, and strong encryption of the data. There is a huge amount of confusion and diffusion of the data during encryption which makes it very difficult for an attacker to interpret the encryption pattern and the plain text form of the encrypted data. The proposed algorithm is also resistant to Brute-Force and pattern attacks.

Research paper thumbnail of Personality Trait Generation using Web Search Query Log

International Journal of Computer …, 2012

The involvement of Internet technology into the day-to-day life of every individual is very much ... more The involvement of Internet technology into the day-to-day life of every individual is very much evident from the fact that the number of users accessing World Wide Web's massive source of information has been increasing exponentially. Access to such ...

Research paper thumbnail of An Encryption Algorithm for Secure Data Transmission

International Journal of Computer Applications, Feb 29, 2012

Encryption is of prime importance when confidential data is transmitted over the network. Varied ... more Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. We have proposed a new algorithm based on the concept used by Rijmen and Daemen (Rijndael algorithm), the founders of AES algorithm. The proposed algorithm encrypts and decrypts two 128 bits data simultaneously i.e. 256 bits data, thus providing strong encryption accompanied with complex processing. The proposed Feistal algorithm uses various invertible, self-invertible, and non-invertible components of modern encryption ciphers and key generation same as that of AES. This algorithm provides a secure, fast, and strong encryption of the data. There is a huge amount of confusion and diffusion of the data during encryption which makes it very difficult for an attacker to interpret the encryption pattern and the plain text form of the encrypted data. The proposed algorithm is also resistant to Brute-Force and pattern attacks.

Log In