Loading

A Novel Cycle Leader Permutation with Elgamal Algorithm for Image Encryption
Boggana. Vandana1, Kanusu. Srinivasa Rao2, Buduri. Reddaiah3, Bodi. Susheel Kumar4

1Boggana Vadana, Department of Computer Science and Technology, Yogi Vemana University, Kadapa-516005, India.

2Kanusu. Srinivasa Rao, Associate Professor, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.

3Buduri. Reddaiah, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.

4Bodi. Susheel Kumar, Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India. 

Manuscript received on 30 March 2024 | Revised Manuscript received on 05 April 2024 | Manuscript Accepted on 15 April 2024 | Manuscript published on 30 April 2024 | PP: 13-17 | Volume-13 Issue-5, April 2024 | Retrieval Number: 100.1/ijitee.E985513050424 | DOI: 10.35940/ijitee.E9855.13050424

Open Access | Editorial and Publishing Policies | Cite | Zenodo | OJS | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: As more people use networks in whatever capacity, security-related issues come up more frequently. These issues could be external to the network or inside to it. To address the security-related issues The science of cryptography and network security makes it possible to protect the resources, data quality, and network infrastructure. Firewalls and filters are utilized across many workstations to safeguard the resources. However, security services are required to safeguard the data during transmission to prevent unauthorized access. To guard against attacks, these services must be changed often. This paper integrates Cycle Leader permutation with Elgamal algorithms to construct such a system. These hybrid solutions can be used to stop hackers from gaining unauthorized access different commercial applications.

Keywords: Encryption, Decryption, Key, Cycle Leader Permutation, Elgamal.
Scope of the Article: Encryption Methods and Tools