Applying the RPBK22 Technique for Secure the Generalized Data

Shalini, K. Shantha and Leelavathy, S. and Pani, Kishore and Dinakar, M. P. and Guruprassath, R. and Sankarganesh (2022) Applying the RPBK22 Technique for Secure the Generalized Data. SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2021, 93.0. pp. 811-820. ISSN 2367-4512

Full text not available from this repository.

Abstract

Nowadays, data is extremely important in the people's world. Recently, people have generated more data using internet media. As a result, this internet data lacks adequate protection and hackers may simply access it. This research work utilizes the RBPK22 method to overcome the difficulty. There are seven stages to implement this method. To find themystery prime key S; To find the X-1 and X-2 values from prime numbers; To find the (X) over bar (1) and (X) over bar (2) values; To find the standard deviation values with the help of Step 2 and Step 3; To exchange a and b esteems from left in a matrix; To locate the T-test values and pair them that numbers from left to right; To exchange the odd and even equation a and b in a given lattice. The RPBK22 strategy gives extraordinary security, while appearing differently with ChaCha technique.

Item Type: Article
Uncontrolled Keywords: RPBK22, Encryption, Decryption, Prime, T-test, ChaCha
Subjects: Computer Science > Computer Science
Computer Science > Information Systems
Computer Science > Telecommunications
Divisions: Engineering and Technology > Aarupadai Veedu Institute of Technology, Chennai, India > Electronics and Communication Engineering
Depositing User: Unnamed user with email techsupport@mosys.org
Last Modified: 06 Feb 2026 06:58
URI: https://ir.vmrfdu.edu.in/id/eprint/6326

Actions (login required)

View Item
View Item