International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 112 - Number 4 |
Year of Publication: 2015 |
Authors: M. Laxmi Jeevani, Kuldeep Chouhan |
10.5120/19652-1261 |
M. Laxmi Jeevani, Kuldeep Chouhan . Time Execution Constraints using Intricate Encryption and Decryption Process for Secure Data Transmission. International Journal of Computer Applications. 112, 4 ( February 2015), 5-9. DOI=10.5120/19652-1261
The encryption and decryption process is widely investigated and developed for a robust data security which is challenging to crack. Many researchers proposed different types of encryption and decryption algorithms such as DES, AES, RSA, etc. , the proposed algorithms are encountered such as deficiency of stoutness and significant amount of time added to packet delay and to maintain the node data security in the network. The data security is the process which protects its privacy, integrity and availability. In this work, text data makes secure using encryption to decryption process while the secret key does not match and produce ambiguous message to the user during execution. The results demonstrate the efficiency of the encryption and decryption process in the measurement of time execution variations are presented.