RPBK21 Technique Used to Secure the Data

Shalini, K. Shantha and Shobana, R. and Preetham, Bhupalam and Shashank, M. P. and Kalyan, Bathula Pavan (2022) RPBK21 Technique Used to Secure the Data. PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON SUSTAINABLE EXPERT SYSTEMS (ICSES 2021), 351.0. pp. 281-295. ISSN 2367-3370

Full text not available from this repository.

Abstract

In the digital era, the information is generated by utilizing Internet media, which is highly ubiquitous and unrestricted. These characteristics may lead to significant challenges. To overcome these, this research work has proposed a ChaCha method to overcome this problem. The proposed method effectively steals data from software developers. The novel RPBK21 strategy is divided into eight parts, and they are: to find the mystery prime key S; to find the X-1 and X-2 values from prime numbers; to find the (X) over bar (1) and (X) over bar (2) values; to find the standard deviation values with the help of Step 2 and Step 3; to exchange the a and b esteems from left in a matrix; to locate the T-test values and pair them that numbers from left to right; to trade the undividable numbers and non-negative whole numbers in a given lattice; to exchange the M pair numbers. As illustrated in the results, the proposed RPBK21 strategy provides extraordinary security while appearing differently about ChaCha and RBJ25 techniques.

Item Type: Article
Uncontrolled Keywords: RPBK21, Encryption, Decryption, Prime, T-test, ChaCha
Subjects: Computer Science > Computer Science
Divisions: Engineering and Technology > Vinayaka Mission's Kirupananda Variyar Engineering College, Salem, India > Computer Science and Engineering
Depositing User: Unnamed user with email techsupport@mosys.org
Last Modified: 06 Feb 2026 06:36
URI: https://ir.vmrfdu.edu.in/id/eprint/5739

Actions (login required)

View Item
View Item