Nishith Sinha

  • Citations Per Year
Learn More
Protecting data from malicious attacks during storage and transmission is the reason for using encryption. Encryption can be achieved by two methods – Transposition and Substitution. Transposition refers to changing the order of characters in a given text. On the other hand, substitution is the process of replacing each character of the plaintext with some(More)
With the growing importance of the internet, secure transmission of information is crucial. Steganography and cryptography helps in providing this much needed data confidentiality. Steganography hides secret information into a cover medium and cryptography converts data into an unrecognizable form. In this paper, the authors proposed a novel approach for(More)
Encryption is a process of hiding significant data so as to prevent unauthorized access and ensure confidentiality of data. It is widely used to transmit data across networks ensuring secure communication. This paper aims at improving the security and efficiency of image encryption by using a highly efficient shuffle based encryption algorithm and an(More)
The escalating significance of securing data over the network has encouraged development of secure encryption algorithms. Cryptography is a technique that assists in development of such secure algorithms. It involves converting intelligible data into an unintelligible form to protect it from intruders. In this paper, the authors propose a simple and secure(More)
RC4 is one of the most widely used stream ciphers which finds its application in many security protocols such as Wi-Fi Protocol Access (WPA) and Wired Equivalence Privacy (WEP). RC4 algorithm has several weaknesses. In order to overcome those weaknesses and enhance its security, numerous modifications have been suggested. These amendments destroy the basis(More)
  • 1