Anurag Sinha, Amrit Kumar Bhadani


According to the present communication system one of the main concerns is secured transformation of data. In this paper we be inclined to propose a two-level encryption in this paper in the first level encryption we use the multiplicative ciphers and Cesar cipher in this level the plain text letters, we shall multiply the key numbers in this level and the second layer encryption we use periodic table exploitation the properties if the quality table, and thus use it for encrypting and decrypting in the same manners. For the information of network security in the second level encryption we will differently types of periodic table properties like atomic no, mass no, IUPAC name, chemical formula, and their properties.


Periodic table, Multiplicative cipher, Double Layer cryptography, Random Cipher

Full Text:



Preneel, B. (2010, September). Cryptography for network security: failures, successes and challenges. In International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (pp. 36-54). Springer, Berlin, Heidelberg.

Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A Review paper on Network Security and Cryptography. Advances in Computational Sciences and Technology, 10(5), 763- 770.

Kumari, S. (2017). A research Paper on Cryptography Encryption and Compression Techniques. International Journal Of Engineering And Computer Science, 6(4).

Shipra Jain, Dr.Vishal Bhatnagar. “A novel DNA sequence Dictionary method for securing data in DNA using Spiral Approach and Framework for DNA Cryptography”. IEEE International conference on advances in Engineering & Technology Research.,2014.

Disina, Abdulkadir Hassan. "Robust Caesar Cipher against frequency cryptanalysis using bi-directional shifting." Diss. Universiti Tun Hussein Onn Malaysia, 2014.

Omolara, O. E., A. I. Oludare, and S. E. Abdulahi. "Developing a Modified Hybrid Caesar Cipher and Vigenere Cipher for Secure Data Communication." Computer Engineering and Intelligent Systems 5.5 (2014): 34-46.

Singh, Ajit, Aarti Nandal, and Swati Malik. "Implementation of Caesar Cipher with Rail Fence for Enhancing Data Security." International Journal of Advanced Research in Computer Science and Software Engineering 2.12 (2012).

Senthil, K., K. Prasanthi, and R. Rajaram. "A modern avatar of Julius Caesar and Vigenere cipher." Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on. IEEE, 2013.

Hadiwibowo.Pengamanan Information and Cryptography - Adding khasanah reading cryptology and information security for the people of Indonesia. Http://, December 23, 2006.

Munir, Rinaldi. 2004. Diktat Lecture IF2153 Discrete Mathematics - Fourth Edition. Bandung: Tenik Informatika Study Program, STEI ITB. 2004. Classic Chiper System. http: //

Krishna moorthy, Dr, and S. Chidam baranathan. "Clever Cardnovel Authentication Protocol (NAUP) in Multi-Computing Internet of Things Environs." (2017).

Duong, T., & Rizzo, J. (2011, May). Cryptography in the web: The case of cryptographic design flaws in asp. net. In Security and Privacy (SP), 2011 IEEE Symposium on (pp. 481-489). IEEE.

Mohamed Saied Emam Mohamed, Albrecht Petzoldt. The shortest Signatures Ever INDOCRYPT2016 2017, LNCS 10095 Springer, pp. 61-77 2016/911.pdf, eprint preprint.

Shay Gueron and Nicky Mouha. Simpira v2: A family of efficient permutations using the AES round function, in Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, 2016, pp. 95:125.

Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed. A Practical Multivariate Blind Signature Scheme. Financial Cryptography and Data Security 2017, LNCS 10322, Springer, pp. 437-454., eprint preprint.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.