Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where A. Chandra Sekhar is active.

Publication


Featured researches published by A. Chandra Sekhar.


granular computing | 2007

Data Encryption Technique Using Random Number Generator

A. Chandra Sekhar; K.R. Sudha; P.V.G.D. Prasad Reddy

The coding theory is an application of algebra that has become increasingly important over the decades. There are some different works that have been devoted to the problems of cryptography/cryptology. Cryptography is the study of sending and receiving secret messages. With the widespread use of information technologies and the rise of digital computer networks in many areas of the world, securing the exchange of information has become a crucial task. Currently, very active research is being done with electronic or communication applications. In the present paper an innovative technique for data encryption is proposed based on the random sequence generation using the recurrence matrices and a quadruple vector. The new algorithm provides data encryption at two levels and hence security against crypto analysis is achieved at relatively low computational overhead.


advances in recent technologies in communication and computing | 2009

Fast Fourier Transforms and Quadratic Forms for Digital Audio Watermarking

A. Chandra Sekhar; Ch. Suneetha; G. NagaLakshmi; B.V. RaviKumar

In this paper a new technique of encryption for embedding secret information in the frequency domains of a cover audio signal is described. A novel method is presented for inaudibly hiding information in an audio signal. The method uses quadratic form as key matrix. The data is first encrypted using the key matrix. The secure data is further embedded in the audio signal in frequency domain using fast Fourier transforms and the results have been analyzed. This consists of data encryption at two levels and the cipher text so obtained becomes quite impossible to break or to interrupt.


International Journal of Mathematics Trends and Technology | 2016

Symmetric Key Cryptosystem for Multiple Encryptions

A. Chandra Sekhar; D. Chaya Kumari; S. Ashok Kumar

Abstract Multiple encryptions is the process of encrypting the plain text more than once. If the plaintext is encrypted twice, then the process of the first encryption is usual encryption and the process of second-time encryption is referred as the superencryption. For multiple encryptions, same or different algorithms can be used. If the same key is used for multiple encryptions, for an attacker it is not that hard to recover the plain text. In this paper, a symmetric cryptosystem is proposed using Fibonacci numbers for the first level of encryption and Affine or Vigenere transformation is employed for super encryption.


International Journal of Computer Applications | 2012

ENCRYPTIONS OF DATA STREAMS USING PAULI SPIN ½ MATRICES AND FINITE STATE MACHINE

B. Krishna Gandhi; A. Chandra Sekhar; S. Sri Jaya Lakshmi

Cryptography is the science of transmission and reception of secret messages. Recently electronic communication has become an essential part of every aspect of human life. Message encryption has become very essential to avoid the threat against possible attacks by hackers during transmission process of the message. Finite state machines (FSM), also known as finite state automation (FSA), at their simplest, are models of the behaviors of a system or a complex object, with a limited number of defined conditions or modes, where mode transitions change with circumstance. In the present paper, new cryptographic scheme is proposed using finite state machine and Pauli spins 1⁄2 matrices.


Archive | 2018

Dynamic Stability Margin Evaluation of Multi-machine Power Systems Using Genetic Algorithm

I. E. S. Naidu; K.R. Sudha; A. Chandra Sekhar

This paper presents a method to find the dynamic stability margin of power system using genetic algorithm. Power systems are subjected to wide range of operating conditions. Modern power systems are equipped with fast-acting protective devices for transient stability problems. Hence, power systems are operated above the transient stability limit. The dynamic behaviour of system can be evaluated using small signal stability analysis. The maximum loading to which the system can be subjected can be obtained by observing the eigenvalue variations of the system under different loading conditions. The loading for which system exhibits a pair of imaginary eigenvalues is the maximum loading limit. Beyond this limit, the system will become unstable. The loading for which the power system exhibits imaginary eigenvalues is evaluated by using genetic algorithm. The dynamic stability margin is evaluated for a 3-machine 9-bus system. The efficacy of the proposed method is tested for the power system including conventional power system stabilizers (CPSS).


Journal of Information and Optimization Sciences | 2015

Linearly independent spanning sets and linear transformations for Multi-level Encryption

A. Chandra Sekhar; V. Anusha; B. Ravi Kumar; S. Ashok Kumar

Abstract The process of encryption plays a vital role for secure communication of data streams through unsecured channels. The concepts in modern algebra are met with a major property that is the existence of inverse for each element in the domain of the chosen algebraic structures. This research article focuses on developing a multi encryption scheme with the existing concepts like basis of a vectors spaces and linear transformations.


International Journal of Mathematical Archive | 2011

A CRYPTOGRAPHIC SCHEME OF LAPLACE TRANSFORMS

G. Naga Lakshmi; B. Ravi Kumar; A. Chandra Sekhar


International Journal of Mathematical Archive | 2013

A ONE TO ONE CORRESPONDENCE IN ELLIPTIC CURVE CRYPTOGRAPHY

P. A. Jyotirmie; B. Ravi Kumar; A. Chandra Sekhar; S. Uma Devi


International journal of engineering research and technology | 2013

Application Of Mealy Machine And Recurrence Relations In Cryptography

P. A. Jyotirmie; A. Chandra Sekhar; S. Uma Devi


International journal of engineering science and technology | 2016

Triple encryption scheme using two independent keys

A. Chandra Sekhar; Ch. Prgathi; S. Ashok Kumar

Collaboration


Dive into the A. Chandra Sekhar's collaboration.

Top Co-Authors

Avatar

B. Ravi Kumar

Gandhi Institute of Technology and Management

View shared research outputs
Top Co-Authors

Avatar

S. Ashok Kumar

Gandhi Institute of Technology and Management

View shared research outputs
Top Co-Authors

Avatar

Ch. Suneetha

Gandhi Institute of Technology and Management

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

B.V. RaviKumar

Gandhi Institute of Technology and Management

View shared research outputs
Top Co-Authors

Avatar

G. NagaLakshmi

Gandhi Institute of Technology and Management

View shared research outputs
Top Co-Authors

Avatar

I. E. S. Naidu

Gandhi Institute of Technology and Management

View shared research outputs
Top Co-Authors

Avatar

V. Anusha

Gandhi Institute of Technology and Management

View shared research outputs
Researchain Logo
Decentralizing Knowledge