Fig. 1


(a) Steps for proposed system confusion diffusion mechanism. (b) Flow diagram of the proposed methodology. (c) Encryption algorithm architecture.


(a) Steps for proposed system confusion diffusion mechanism. (b) Flow diagram of the proposed methodology. (c) Encryption algorithm architecture.