Cryptographic Techniques using Binary Tree and Tree Traversal

Authors

  • M Shanmugam Shoba  Senior Assistant Professor, Department of Information Science and Engineering, New Horizon College of Engineering, Bangalore, Karnataka, India

Keywords:

Cryptography, Encryption, Decryption, Hacker,Binary Search Tree, Breadth First Search, Caesar Cipher, Depth Firstsearch, Graph Traversal

Abstract

In 21st century one of the most emerging problems is Data Security. For secure communication we always use different security algorithms e.g. Caesar cipher, modified Caesar cipher, IDEA, AES, RSA algorithm etc. and in data structures using C we have Linked list, stack ,queue ,tree and graph. In graph we have graph traversal i.e. BFS (Breadth First Search) or DFS (Depth First Search). This paper presents a new idea for Data encryption and decryption in order to provide security for data. Also it provides the new technique for security which is combination of Caesar Cipher and graph traversal, Binary search tree together then security will be much higher than only using Caesar cipher or graph traversal or binary search tree.

References

  1. "A New Approach For Complex Encrypting And Decrypting Data" by Obaida Mohammad Awad Al-Hazaimeh in International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
  2. Data Encryption and Decryption using Deterministic Random Key for Transmission: A Review" by Er. Vidiksha1 in JARCSSE Volume 3, Issue 8, August 2013 ISSN: 2277 128X.
  3. Dragos Trinca, "Sequential and Parallel Cascaded Convolution Encryption with Local Propagation: Toward Future Directions in Cryptography", Proceedings of The third International Conference on information Technology- New Generations. (ITNG’06), 2006, IEEE Computer Society.
  4. JON L. BENTLEY, M, " Multidimensional Binary Search Trees in Database Applications", IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. SE-5, NO. 4, JULY 1979, PP 333
  5. Scott Beamer Krste Asanovic David Patterson," Direction-Optimizing Breadth-First Search", SC12, November 10-16, 2012
  6. Programmer Enas Ismael Imran, Programmer Farah abdulameerabdulkareem, "Enhancement Caesar Cipher for Better Security", IOSR Journal of Computer Engineering (IOSR-JCE), Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 01
  7. S G Srikantaswamy and Dr. H D Phaneendra "IMPROVED CAESAR CIPHER WITH RANDOM NUMBER GENERATION TECHNIQUE AND MULTISTAGE ENCRYPTION", International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.4, December 2012, page number 39

Downloads

Published

2017-02-28

Issue

Section

Research Articles

How to Cite

[1]
M Shanmugam Shoba, " Cryptographic Techniques using Binary Tree and Tree Traversal, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 1, pp.175-180, January-February-2017.