Abstract—The rapidly increasing reliance of nearly every kind of organization on systems that process electronic data has introduced new concerns, and to tackle the misuse of precious data, encryption of important data has to be done. Traditional encryption security algorithms are well known and can undergo attacks in a number of ways. In this paper we will introduce encryption and the different encryption algorithms, then we will look briefly at the new purposed algorithm based on Non-Uniform Steps Model, which can be applied as a layer over traditional encryption algorithm to enhance power of them. Further in this paper we will briefly describe the various encryption algorithms that we can utilize with Non-Uniform Steps model to enhance security and issues involved with the algorithm and their possible solution. We will try to characterize proposed algorithm to have some experimental analysis. We will then have a look at encryption models applicability and propose new algorithms as a possible solution of number of problems. We will lastly conclude the paper.
Index Terms—Communication system security, data security, security, signature verification.
The authors are with the Department of Computer Engineering, Aligarh Muslim University, Aligarh, U.P., India (e-mail: email@example.com, firstname.lastname@example.org).
Cite: Nitish Varshney and Mohammed Abdul Qadeer, "Nitish Varshney and Mohammed Abdul Qadeer," International Journal of Engineering and Technology vol. 4, no. 6, pp. 808-812, 2012.