In the real world, data security plays an important role where confidentiality, authentication, integrity, non-repudiation are given importance. The universal technique for providing confidentiality of transmitted data is cryptography. Three sets of keys are used to provide secure data transmission with colors that act as a vital security element, thus providing authentication.
The world we live in today is a very fascinating and mysterious place. The widespread impact and use of the Internet did not hypnotize the world before the early 1990s. As the increasing use of the computer and the Internet implies the need for some techniques to protect files and other user information that is not intended for the same. Network security measures are necessary to protect data during transmission and to ensure security there are several techniques that are used. In more general terms, it is a question of constructing and analyzing protocols that exceed the influence of the third party and which are related to various aspects of information security, such as data confidentiality, data integrity, authentication and not repudiation. Encryption is the technique that transforms information from readable state to illegible state. Decryption is the totally opposite of encryption that converts illegible or absurd state information to readable state. There are many cryptographic techniques, but we designed a new technique for the purpose of encryption and decryption. In this technique we will use the concept of secret key as Armstrong number and colors instead of prime numbers. As we know that each pixel in the image has color and is a combination of RGB (red, green and blue) component.