CFP last date
20 December 2024
Reseach Article

Enciphering using Bit-Wise Logical Operators and Pairing Function with Text Generated Hidden Key

by B. Reddaiah, R. Pradeep Kumar Reddy, S. Hari Krishna
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 8
Year of Publication: 2015
Authors: B. Reddaiah, R. Pradeep Kumar Reddy, S. Hari Krishna
10.5120/21562-4597

B. Reddaiah, R. Pradeep Kumar Reddy, S. Hari Krishna . Enciphering using Bit-Wise Logical Operators and Pairing Function with Text Generated Hidden Key. International Journal of Computer Applications. 121, 8 ( July 2015), 30-35. DOI=10.5120/21562-4597

@article{ 10.5120/21562-4597,
author = { B. Reddaiah, R. Pradeep Kumar Reddy, S. Hari Krishna },
title = { Enciphering using Bit-Wise Logical Operators and Pairing Function with Text Generated Hidden Key },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 8 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 30-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number8/21562-4597/ },
doi = { 10.5120/21562-4597 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:07:56.262838+05:30
%A B. Reddaiah
%A R. Pradeep Kumar Reddy
%A S. Hari Krishna
%T Enciphering using Bit-Wise Logical Operators and Pairing Function with Text Generated Hidden Key
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 8
%P 30-35
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In present days electronic communication is a fundamental method of exchanging information. Secure communication is a major concern by which people can share information with varying degrees of certainty that third parties cannot capture the information that is transmitted over network. With the introduction of internet and distributed systems security issues are more challenging and complex. Hence information security is an important consideration in these days. Cryptography and information security is helping to develop more number of practical approaches to enforce security for networks. In this paper the proposed algorithm which uses basic encryption techniques like substitution, transposition, bitwise logical operations along with pairing function to encrypt the data. The algorithm itself generates the key from plain text and hides within plaintext.

References
  1. S. William, Cryptography and Network Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc. , 1999 pp 23-50
  2. S. Hebert, "A Brief History of Cryptography", an article available at http://cybercrimes. net/aindex. html
  3. Behrouz A. Forouzan, Cryptography and Network Security, Special Indian Edition, TATA McGraw Hill.
  4. K. Gary, "An Overview of Cryptography", an article available at www. garykessler. net/library/crypto. html
  5. "Basic Cryptographic Algorithms", an article available at www. itsc. state. md. us/oldsite/info/InternetSecurity/Crypto/CryptoIntro. html#Algorthms
  6. Nidhi Singhal, J. P. S. Raina "Comparative Analysis of AES and RC4 Algorithms for Better utilization" International Journal of Computer Trends and Technology-July to Aug Issue 2011.
  7. D. KHAN, "The Codebreakers", Macmillan Publishing Company, New York, 1967.
  8. P. P Charles & P. L. Shari, "Security in Computing: 4th edition", Prentice-Hall, Inc. ,2008.
  9. A. S. Tanenbaum, "Modern Operating Systems", Prentice Hall, 2003.
  10. Janan Ateya Mahdi, Design and Implementation of proposed B-R Encryption Algorithm, IJCCCE, VOL. 9, NO. 1, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Pairing function NOT XOR