Loading

A Practical Public Key Encryption Scheme Based on Learning Parity with Noise
N. Gangadhar Reddy1, L. Ramaparvathy2

1N.Gangadhar Reddy, UG Scholar, Department of CSE, Saveetha School of Engineering, Saveetha Institute of Medical And Technical Sciences, Chennai, Tamil Nadu, India.
2Dr.L.Ramaparvathy, Professor, Department of CSE, Saveetha School of Engineering, SIMATS, Tamil Nadu, India.
Manuscript received on December 16, 2019. | Revised Manuscript received on December 22, 2019. | Manuscript published on January 10, 2020. | PP: 1893-1896 | Volume-9 Issue-3, January 2020. | Retrieval Number: C8458019320/2020©BEIESP | DOI: 10.35940/ijitee.C8458.019320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: To ensure digital security and protection, it is basic to structure security and handy open key encryption plans. Today, huge information and distributed computing bring uncommon open doors as well as essential security challenges. Enormous information faces numerous security chances in the assortment, stockpiling, and utilization of information and brings major issues with respect to the revelation of private client information. It is trying to accomplish security and security assurance in the enormous information condition. Accordingly, to satisfy the developing need of open key encryption in this condition, we proposed a solitary piece open key encryption plot dependent on a variation of learning equality with commotion (LPN) and stretched out it to a multi-bit open key encryption conspire. We demonstrated the accuracy and picked plaintext assault security of the proposed technique. Our plans tackled encoding mistake rate issues of the current open key plans dependent on LPN, and the encoding blunder rate in our plans is immaterial. To meet the growing demand on security and privacy. It has been designed according to the basics of server and appropriated processing cryptographic techniques. Therefore the rate of data encryption is so sensitive and to be used as per the regulations of the algorithms that has been used within the rate of enormous information that has been used. With the use of data encryption gives the data utilisation giving some sort of difficult tasks which are to be further to be used as per required requirements. With the consideration of the large information condition different plans have been considered. 
Keywords:  Encryption, Security, Information, Plaintext
Scope of the Article: Information and Data Security