Journal of Theoretical and Applied Information Technology
Encryption scheme is widely used in the field of communication network security. The network systems are focus on reliability, service and functions, which provided end-to-end service to protect encrypted data node. It enables to interconnect the various functional levels to interact and communicate with each other. An interconnected group of nodes use a computational model for data processing, which is based on a node connections approach. In this paper, data are transmitted from 'N' inputs as packets (e.g. 1 byte), through hardware based EP, shows polarized output after checking bits.