Article Details

Secure and Effective Cryptography Technique Over the Block Cipher |

Mounika Adavelli, Afreen Sultana, Vinitha Bhodhe, Chandu Naik Azmera, in International Journal of Information Technology and Management | IT & Management


The convolution of cryptography does not allow many people to actuallyunderstand the determination and therefore available for practicing securitycryptography. Cryptography process attempts to distribute an estimation ofbasic cryptographic primitives across a number of confluxes in order to reducesecurity assumptions on individual nodes, which establish a level offault-tolerance opposing to the node alteration. In a successively networkedand distributed communications environment, there are more and more usefulscenarios where the ability to distribute a computation between a number ofdissimilar network intersections is needed. The reason back to the efficiency isthe separation of nodes that perform distinct tasks, fault-tolerance isachieved if some nodes are unavailable then others can perform the task and thetrust required to perform the task is shared between nodes to obtain security,that order differently. Hence, this paper aims to describe and analyze thedifferent research that has done toward text encryption and description in theblock cipher. Moreover, this paper demonstrates a cryptography model in theblock cipher.