CFP last date
20 December 2024
Reseach Article

Implementation of Tangent and Cotangent rules to Provide Security in E-communication

by Narander Kumar, Vishal Verma, Vipin Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 14
Year of Publication: 2013
Authors: Narander Kumar, Vishal Verma, Vipin Saxena
10.5120/13808-1790

Narander Kumar, Vishal Verma, Vipin Saxena . Implementation of Tangent and Cotangent rules to Provide Security in E-communication. International Journal of Computer Applications. 79, 14 ( October 2013), 11-14. DOI=10.5120/13808-1790

@article{ 10.5120/13808-1790,
author = { Narander Kumar, Vishal Verma, Vipin Saxena },
title = { Implementation of Tangent and Cotangent rules to Provide Security in E-communication },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 14 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 11-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number14/13808-1790/ },
doi = { 10.5120/13808-1790 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:58.684861+05:30
%A Narander Kumar
%A Vishal Verma
%A Vipin Saxena
%T Implementation of Tangent and Cotangent rules to Provide Security in E-communication
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 14
%P 11-14
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the data communication, the intriguing issue to provide data security and these led to comprise the many areas including the impregnable medium and trusted third party to maintain a database and various types of encryption techniques. These are main inducement of researchers in this area to protect the data from unauthorized users for malicious purpose. Therefore there are requires the different types of encryption and decryption techniques to secure the data. In the proposed paper, there are used the Tangent and Cotangent rules to generate the cipher and decipher at sending and receiving ends respectively. At the sending side, take the message alphabets which message want to communicate through electronic communication and find the corresponding values of alphabets from standard alphabetical table and apply the rules of Tangent. Find the corresponding values of Tangent of a particular alphabet and use this value as cipher at sending end. At the receiving end, there are taking the value of Cotangent of those particular receiving alphabets. Finally, get the value of same alphabets. This paper provides an algorithm as well as validates the proposed mechanism through UML Diagram.

References
  1. Himanshu Gupta and Vinod Kumar Sharma, "Multiphase Encryption: A New Concept in Modern Cryptography" International Journal of Computer Theory and Engineering, Vol. 5, No. 4, pp-238-240, August 2013.
  2. Anjali Patil, Rajeshwari Goudar, "A Comparative Survey Of Symmetric Encryption Techniques For Wireless Devices" International Journal of Scientific & Technology Research, Volume 2, Issue 8, pp-61-65, August 2013.
  3. Dr. Mamta Sood, Manohar Wagh, Monika Cheema, " A Review on Various Data Security Techniques in Wireless Communication System" International Journal of Engineering Research and Applications, Vol. 3, Issue 2, pp. 883-890, March -April 2013.
  4. Vimal, Mahendra Kumar Patil, "Review of Various Data Hiding Algorithms in Encrypted Images" International Journal of Engineering Research and Development, Volume 7, Issue 6, PP 42-49, June 2013.
  5. ShachiSharma, VintiGupta, "Encryption and Decryption using one PAD time Algorithm in MAC Layer" International Journal of Innovative Research in Science, Engineering and Technology Vol. 2, Issue 6, pp-2248-2250, June 2013.
  6. P. Aatheeswaran, Dr. R. Suresh Babu, "FPGA can be implemented by using Advanced Encryption Standard Algorithm" International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 1, pp-675-679, jan 2013.
  7. Reema Gupta1, Tanisha, Priyanka, "Enhanced Security for Cloud Storage using Hybrid Encryption" International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 7, pp-2710-2717, July 2013.
  8. TSANG-YEAN LEE, HUEY-MING LEE, HOMER WU, JIN-SHIEH SU, "Data Transmission Encryption and Decryption Algorithm in Network Security" Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization, Lisbon, Portugal, pp-417-422, September 22-24, 2006.
  9. Sanjoli Singla, Jasmeet Singh, "Cloud Data Security using Authentication and Encryption Technique" International Journal of Advanced Research in Computer Engineering & Technology, Volume 2, Issue 7, pp-2232-2235, July 2013.
  10. Mohammad Ali Bani Younes and Aman Jantan, "Image Encryption Using Block-Based Transformation Algorithm" International Journal of Computer Science, 35:1, IJCS_35_1_03, IAENG, 19 February 2008.
  11. Suresh M G, Dr. Nataraj K. R, "Advanced Cryptographic System for data Encryption and Decryption" International Journal of Engineering Research & Technology, Vol. 2 Issue 1, pp-1-6, January- 2013.
  12. B. Padmavathi, S. Ranjitha Kumari, "A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique" International Journal of Science and Research, Volume 2 Issue 4, pp-170-174, April 2013.
  13. Jasdeep Singh Bhalla, Preeti Nagrath, " Nested Digital Image Watermarking Technique Using Blowfish Encryption Algorithm" International Journal of Scientific and Research Publications, Volume 3, pp-1-6,Issue 4, April 2013.
  14. Sabareesan, Gobinathan, "Network Database Security Issues and Defense" International Journal of Engineering Research and Applications, Vol. 3, Issue 1, pp. 1748-1752, January -February 2013.
  15. Parameshachari B D, K M Sunjiv Soyjaudah, Sumitrha Devi K A, " Secure Transmission of an Image using Partial Encryption based Algorithm"International Journal of Computer Applications, Volume 63– No. 16, pp-33-36, February 2013.
  16. Rajinder Kaur, Er. Kanwalpreet Singh, "Comparative Analysis and Implementation of Image Encryption Algorithms" International Journal of Computer Science and Mobile Computing,Vol. 2, Issue. 4, pg. 170 – 176, April 2013.
  17. Vishwa gupta,. Gajendra Singh ,. Ravindra Gupta, " Advance cryptography algorithm for improving data security" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, pp-1-6. January 2012.
  18. Yashpal Mote, Paritosh Nehete, Shekhar Gaikwad, "Superior Security Data Encryption Algorithm (NTRU)" International Journal of Engineering Sciences, Vol. 6, Issue July 2012.
  19. Manmeet Kau1, Manjit Kaur, Gurmohan Singh, "Comparison of TACIT Encryption Algorithm with Various Encryption Algorithms" International Journal of Electronics and Computer Science Engineering, Volume1,Number 2, pp741-750, 2012.
  20. Gamil R. S. Qaid, Sanjay N. Talbar, "Encryption and Decryption of Digital Image Using Color Signal" International Journal of Computer Science Issues, Vol. 9, Issue 2, No 2, pp-588-592, March 2012.
  21. Ayman Mousa, Elsayed Nigm, Sayed El-Rabaie, Osama Faragallah, " Query Processing Performance on Encrypted atabases by Using the REA Algorithm" International Journal of Network Security, Vol. 14, No. 5, PP. 280-288, Sept. 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Tan x Cot x cipher/decipher e-communication UML.