Trends in Applied Sciences Research1819-35792151-7908Science International10.3923/tasr.2006.416.425SharmaSanjeev JainR.C. BhadauriaSarita 4200614The name mobile ad hoc network (MANET) is often used to describe infrastructure less mobile networks. Since there is a lack of infrastructure and the node mobility is way larger than in wired network and power limitations of a mobile node, new protocols are proposed to handle these new challenges. With the anticipated growth of connected devices the usage of ad hoc networks will probably increase. As more and more uses for these devices pop up it is certain that the need for securing the communications will be a high priority in the future. There are solutions proposed but all suffers from some drawbacks. Multimedia streaming is quite resource demanding. For encryption of such kind of data require high processing and consume more battery power. To secure end-to-end multimedia traffic the recommendation falls on hybrid algorithms. Many different approaches have been proposed over the years. The ones that have gotten the most common use are the Data Encryption Standard (DES) and the Rivest-Shami r- Adleman (RSA) Cryptosystem. The DES system is getting older and the new standard, the Advanced Encryption Standard (AES), is getting deployed in more and more solutions. We have developed a new application layer protocol PE2 for encryption for both multimedia and text data on mobile Ad hoc network. This protocol attempts to adapt the Rijndael 256 bit block and key for mobile Ad hoc Network Environment encryption through the introduction of compression algorithms, Haar Transform for image data and Run Length encoding for text data to reduce input bits keeping the amount of computation less conforming to limitations of power of the devices used in MANET as limited battery resources are available at node.]]>Blomer, J., J.G. Merchan and V. Krummel,20042004Daemen, J. and V. Rijmen,19991999Daemen, J. and V. Rijmen,2002Dressler, F.,20052005pp: 781786Gary, S.,1991pp: 54-58pp: 54-58Gladman, B.,19921992Hubaux, J.P., L. Buttyan and S. Capkun,20012001pp: 146155Johnson, D.B. and D.A. Maltz,19961996pp: 153-181pp: 153-181Lamport, L., R. Shostak and M. Pease,19824382401Lou, W., W. Liu and F. Yuguang,20042004pp: 24042413Nichols, R.K. and P.C. Lekkas,2002Perkins, C.E., E.M. Belding-Royer and S.R. Das,20032003Schiller, J.,2000Steve, A.,1991pp: 309-387pp: 309-387Sharma, S., R.C. Jain and S. Bhadauria,200621519Cihan, M. and C.K. Koc,20052005