A Novel Encryption RAAM Algorithm in Different Multimedia Applications
Chirag Sharma1, Aman Kumar2, Akancha Sinha3, Meraj Ahmad4
1Chirag Sharma, Department of Computer Science and Engineering, Lovely Professional University, Jalandhar (Punjab), India.
2Aman Kumar*, Department of Computer Science and Engineering, Lovely Professional University, Jalandhar (Punjab), India.
3Akancha Sinha, Department of Computer Science and Engineering, Lovely Professional University, Jalandhar (Punjab), India.
4Meraj Ahmad, Department of Computer Science and Engineering, Lovely Professional University, Jalandhar (Punjab), India.
Manuscript received on March 26, 2021. | Revised Manuscript received on May 13, 2021. | Manuscript published on May 30, 2021. | PP: 9-13 | Volume-10 Issue-5, May 2021. | Retrieval Number: 100.1/ijsce.F34920510521 | DOI: 10.35940/ijsce.F3492.0510521
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In this era where everything is becoming digital the most challenging topic in front of us is Data Security in every aspect even in the secured communication channel. These issues can be tackled by using strong Data Encryption and the trusted third party who maintains the database. The fast development in Digital Technology also comes with the rapid crimes and the insecurity of data theft. From time to time engineers came up with many encryption techniques like Caser Ciphers, Vernam Ciphers, Vigenère Cipher which helped us in securing the data but with lots of flaws that later were exploited by the cybercriminals. So, they cannot provide sufficient security. In this research paper, we have proposed a new, more efficient encryption algorithm. This algorithm will use multiple keys during encryption or decryption so it will be very less vulnerable against the attacks like Brute force.
Keywords: Cryptography, Ciphers, Private Key, Public Key.