K. Karthik, S. Rajaprakash, Vaddepraveenkumar, Avula Gopinath, K. Chandu
{"title":"KRB01数据保护方法","authors":"K. Karthik, S. Rajaprakash, Vaddepraveenkumar, Avula Gopinath, K. Chandu","doi":"10.1109/I-SMAC52330.2021.9640948","DOIUrl":null,"url":null,"abstract":"Data is more readily available through social media, hospitals, populations, and other places. The importance of digital data in current and future world cannot be overstated, because data is the only factor that determines the survival of human lives in the world. Despite the hype, digital data is growing more vulnerable to hackers due to a lack of effective security. This research work implements KRB01, a new approach to solve this problem. There are four steps to implement the proposed procedure. The first step applies the T-test technique; The second step applies the odd operations; The third step represents even operations; and the final fourth step applies the equations. The KRB01 method gives high security when compared to ChaCha method.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"KRB01 Method for Securing the Data\",\"authors\":\"K. Karthik, S. Rajaprakash, Vaddepraveenkumar, Avula Gopinath, K. Chandu\",\"doi\":\"10.1109/I-SMAC52330.2021.9640948\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data is more readily available through social media, hospitals, populations, and other places. The importance of digital data in current and future world cannot be overstated, because data is the only factor that determines the survival of human lives in the world. Despite the hype, digital data is growing more vulnerable to hackers due to a lack of effective security. This research work implements KRB01, a new approach to solve this problem. There are four steps to implement the proposed procedure. The first step applies the T-test technique; The second step applies the odd operations; The third step represents even operations; and the final fourth step applies the equations. The KRB01 method gives high security when compared to ChaCha method.\",\"PeriodicalId\":178783,\"journal\":{\"name\":\"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)\",\"volume\":\"64 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I-SMAC52330.2021.9640948\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SMAC52330.2021.9640948","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data is more readily available through social media, hospitals, populations, and other places. The importance of digital data in current and future world cannot be overstated, because data is the only factor that determines the survival of human lives in the world. Despite the hype, digital data is growing more vulnerable to hackers due to a lack of effective security. This research work implements KRB01, a new approach to solve this problem. There are four steps to implement the proposed procedure. The first step applies the T-test technique; The second step applies the odd operations; The third step represents even operations; and the final fourth step applies the equations. The KRB01 method gives high security when compared to ChaCha method.