Applying the RPBK22 Technique for Secure the Generalized Data

Shantha Shalini, K. and Leelavathy, S. and Pani, Kishore and Dinakar, M. P. and Guruprassath, R. and Sankarganesh (2022) Applying the RPBK22 Technique for Secure the Generalized Data. Scopus, 93. pp. 811-820. ISSN 2367-4512

Full text not available from this repository.

Abstract

This research utilizes the RBPK22 method for securing internet data. The method involves seven stages: determining the mystery prime key S, calculating X1 and X2 from prime numbers, finding X¯1 and X¯2, computing standard deviations, exchanging a and b in a matrix, locating T-test values and pairing numbers, and swapping odd and even values in the lattice. The RBPK22 strategy enhances data security, showing advantages over the ChaCha technique. © 2022 Elsevier B.V., All rights reserved.

Item Type: Article
Subjects: Engineering > Engineering
Divisions: Engineering and Technology > Aarupadai Veedu Institute of Technology, Chennai > Computer Science Engineering
Depositing User: Unnamed user with email techsupport@mosys.org
Last Modified: 02 Dec 2025 09:36
URI: https://vmuir.mosys.org/id/eprint/3028

Actions (login required)

View Item
View Item