• Parvesh Kumar
  • K.P. Yadav


Cryptography, Autolysis, Optimization, Encryption.


Research technique computer technique, e-commerce application, social network and all other organization huge amount of data uses daily. And everyone uses a computer or mobile device and other component also needs to understand how to keep their computer, system and protect data secure. Secure computer system does not allow data to be disclosed to anyone who is not authorized to access it. So to protect data several encryption techniques are used DES, AES, and RSA. The billions GB of data are send or received from one network machine to other network machine so it is very necessary to protect data from the unauthorized access. The security protection is very critical issues in the software industry various types of algorithm table are used. Now present most of the tools support encryption or decryption method using one table (DES, AES, and RSA) and others.

In the research we observe present world many types of tools uses to protect data and support various algorithm method and tables to protect the data and create a layer, dual layer and multi-layer to protect the data but there is various gaps between the data security. Hackers use various gaps method to decrypt the data.

In this research we tried to found various gaps in data security, we analyze security gaps on various tools several of tools use separate algorithm methods to encrypt the data and many protection layers create to secure data

In research “Data Cryptography Optimizer Collaborative Autolysis bit Generator” method created and tried to fill the gaps between security layers, Data cryptography optimizer tools use table encrypted method for encrypt data and second table encrypted method for decrypt data files, here we use two table method for data encryption and decryption.


Download data is not yet available.




How to Cite

Parvesh Kumar, & K.P. Yadav. (2020). TOWARDS DATA CRYPTOGRAPHY OPTIMIZER COLLABORATIVE AUTOLYSIS BIT GENERATOR. PalArch’s Journal of Archaeology of Egypt / Egyptology, 17(16), 132-136. Retrieved from