Periodicity: Bi Annual.
Impact Factor:
Submission:Any Time
Publisher:IIR Groups
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 2 Issue 2 Date of Publication:   December 2013

Crypto System to Network


Page(s):   36-41 ISSN:   2278-2397
DOI:   10.20894/IJCNES. Publisher:   Integrated Intelligent Research (IIR)

In this Crypto System to Network we propose a new data encryption algorithm based on private key (symmetric key) cryptography method.The volume of network traffic over the Internet is exponent daily due to increase in communication through E-mails, small branches remotely connect to their corporate network and commercial transactions. Hence protection of networks and their services from unauthorized modification and destruction is very much needed.TCPIP is the most commonly used communication protocol in the Internet domain. IP packets are exchanged between the end hosts as plain text (without any encryption). As Internet uses Packet Switching Data Network anybody who can access to Packet Switching Data Network can change the data. Hence securing data over the network is difficult. The goal of network security is to provide, authenticity, confidentiality and integrity. Confidentiality is making sure that no body other than the receiver will be able to read the data. Integrity is must and data didnt get modified by some other means while data transmitted. Authenticity is making sure that the data is coming from the correct source.In this Paper using crypto method, Keys are shared between two end hosts using Diffie-Hellman algorithm. Cyber block chaining method is used while encrypting/decrypting the data. More prime numbers are generated well in advance and kept for further key refreshments. Periodically keys were refreshed, so it does not give the time to hacker to attack the system. As simple operations are used, we will be able to achieve fast and secure data encryption/decryption using this method. The proposed approach is verified through various tests.