Secure Sharing of Data using an Algorithm Namely KAN
Sadhu Narayana Naidu1, Itha Aravinda Kousik2, SumaiyaThaseen3

1Sadhu Narayana Naidu, School of Information Technology and Engineering, Vellore Institute of Technology, Vellore.
2Itha Aravinda Kousik, School of Information Technology and Engineering, Vellore Institute of Technology, Vellore.
3Sumaiya Thaseen, School of Information Technology and Engineering, Vellore Institute of Technology, Vellore.

Manuscript received on 04 July 2019 | Revised Manuscript received on 09 July 2019 | Manuscript published on 30 July 2019 | PP: 2959-2966 | Volume-8 Issue-9, July 2019 | Retrieval Number: I8523078919/19©BEIESP | DOI: 10.35940/ijitee.I8523.078919

Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Large amount of data is transferred through the internet, which is highly insecure. This can cause disruption of data due to attacks. To resist those attacks, the analysts are centered on the distinctive sort of systems to verify the information from assaults. Some of the techniques are AES, DES, and Digital Signatures etc. These techniques are not providing abnormal state proficient of security. So, in order to increase the efficiency level, we proposed a new method called KAN algorithm which is an extension of RSA algorithm to enhance the security of normal data by utilizing graph theory approach. This algorithm can be applicable for military basis and highly information secure system.
Keywords: Encryption, Decryption, Graph, Periodic Elements, Security.

Scope of the Article: Algorithm Engineering