A New Method For Encryption Using Fuzzy Set Theory
A New Method For Encryption Using Fuzzy Set Theory
A New Method For Encryption Using Fuzzy Set Theory
N.Kavinilavu
Associate Professor
Research Scholar
Alagappa University
Alagappa University
Karaikudi
karaikudi
ABSTRACT
Security of data is important factor in data transmission
1. INTRODUCTION
In
this
paper
we
focus
on
the
the
encryption
using
symmetric
key
fuzzy logic will provide the text in the zero to one value.
small,
key provided by the user is the same key that is used for
the encryption then original data will be retrieved. The
paper, integrates the encryption of text and conversion
of the unscrambled text from numerical to original by
using fuzzy logic. In this paper, we involve matrix
embedded
micro-controllers
to
large,
in
hardware,
software
(or)
input information.
Page 320
2. RELATED WORK
involves
four
important
aspects:
thus
the
generally
much
more
inefficient
than
approach
which
is
employed
by
many
Symmetric
cryptography
refers
to
encryption
Page 321
cipher key.
2.1 Background
array.
Security is the main problem in the modern
data communication. There are a lot of cyber-crimes
have arises with the development of technology.
manipulation.
are
categories
transposition
divided
transposition,
into
three
substitution,
major
and
3. PROPOSED WORK
Page 322
In
the
shift
rows
()
shifted.
In
mix
column
()
of the state.
subBytes
()
Page 323
membership matrix.
system. Convert
the matrix
with
Matrix Transformation
encryption
comparing
for
later
process.
The
matrix
of
the
text.
This
matrix
Page 324
Fig-1
Fig-4
5. CONCLUSION
In this paper, a symmetric cryptosystem is
Fig-2
Fig-3
data.
This
will
eliminate
the
Page 325
BIOGRAPHY:
Ms.N.Kavinilavu
Dr.S.S.Dhenakaran
Prof.Dr.SS.DHENAKARAN is working as an
associate professor in the department of Computer
Science and Engineering Alagappa university,
karaikudi,Tamilnadu. He has received his Ph.d in
Computer Science and Engineering from Alagappa
University, karaikudi, Tamilnadu. He has published
many papers in international journals and presented
in the national and international conferences.
Page 326