Vijaypal Singh , Sunny Chauhan, Markandey Tiwari , Jai Vikrant
Abstract
To protect our data from being misused we need to secure our information. To secure data there are various encryption algorithms available. In this we Divide our data in 3 parts and encrypt the data using 3 Different encryption algorithms . After this a key is generated which is used as a secret key for decryption. The Cipher Text and Key is given to the recipient through which they can decrypt the message.
[3] Matt Pharr, Randima Fernando, "GPU Gems 2: Programming Techniques for High-Performance Graphics and General-Purpose Computation" in , Addison-Wesley Professional, 03 2005.
[4] https://ieeexplore.ieee.org/document/563518 M. E. Hellman, "DES will be totally insecure within ten years", IEEE Spectrum, vol. 16, no. 7, pp. 32-39, July 1979.
V. Singh, S. Chauhan, M. T. , J. Vikrant,
"Secure Data Storage Using Hybrid Cryptography", International Journal of Innovative Research in Engineering & Management (IJIREM), Vol-5, Issue-6, Page No-249-250, 2018. Available from:
Corresponding Author
Vijaypal Singh
Department of computer science & Engg, G L Bajaj Institute of Technology & Management, Gr Noida, India