• Mar 26, 2024 News!Vol.16, No. 1 has been published with online version.   [Click]
  • Jan 02, 2024 News!All papers in IJET will be publihsed article by article staring from 2024.
  • Nov 03, 2023 News!News | Vol.15, No. 4 has been published with online version.   [Click]
General Information
    • ISSN: 1793-8236 (Online)
    • Abbreviated Title Int. J. Eng. Technol.
    • Frequency:  Quarterly 
    • DOI: 10.7763/IJET
    • APC: 500 USD
    • Managing Editor: Ms. Jennifer Zeng
    • Abstracting/ Indexing: Inspec (IET), CNKI Google Scholar, EBSCO, ProQuest, Crossref, Ulrich Periodicals Directory, Chemical Abstracts Services (CAS), etc.
    • E-mail: ijet_Editor@126.com
IJET 2012 Vol.4(6): 808-812 ISSN: 1793-8236
DOI: 10.7763/IJET.2012.V4.489

Non-Uniform Steps Model: New Layer to Traditional Security Encryption Algorithms (Next Generation Data Security Layer).

Nitish Varshney and Mohammed Abdul Qadeer

Abstract—The rapidly increasing reliance of nearly every kind of organization on systems that process electronic data has introduced new concerns, and to tackle the misuse of precious data, encryption of important data has to be done. Traditional encryption security algorithms are well known and can undergo attacks in a number of ways. In this paper we will introduce encryption and the different encryption algorithms, then we will look briefly at the new purposed algorithm based on Non-Uniform Steps Model, which can be applied as a layer over traditional encryption algorithm to enhance power of them. Further in this paper we will briefly describe the various encryption algorithms that we can utilize with Non-Uniform Steps model to enhance security and issues involved with the algorithm and their possible solution. We will try to characterize proposed algorithm to have some experimental analysis. We will then have a look at encryption models applicability and propose new algorithms as a possible solution of number of problems. We will lastly conclude the paper.

Index Terms—Communication system security, data security, security, signature verification.

The authors are with the Department of Computer Engineering, Aligarh Muslim University, Aligarh, U.P., India (e-mail: nitishvarshney@zhcet.ac.in, maqadeer@gmail.com).


Cite: Nitish Varshney and Mohammed Abdul Qadeer, "Nitish Varshney and Mohammed Abdul Qadeer," International Journal of Engineering and Technology vol. 4, no. 6, pp. 808-812, 2012.

Copyright © 2008-2024. International Journal of Engineering and Technology. All rights reserved. 
E-mail: ijet_Editor@126.com