Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Call for Paper
January Edition
IJCA solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 20 December 2024

Submit your paper
Know more
Reseach Article

An Encryption Algorithm for Secure Data Transmission

by Rohan Rayarikar, Sanket Upadhyay, Deeshen Shah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 40 - Number 7
Year of Publication: 2012
Authors: Rohan Rayarikar, Sanket Upadhyay, Deeshen Shah
10.5120/4980-7238

Rohan Rayarikar, Sanket Upadhyay, Deeshen Shah . An Encryption Algorithm for Secure Data Transmission. International Journal of Computer Applications. 40, 7 ( February 2012), 43-47. DOI=10.5120/4980-7238

@article{ 10.5120/4980-7238,
author = { Rohan Rayarikar, Sanket Upadhyay, Deeshen Shah },
title = { An Encryption Algorithm for Secure Data Transmission },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 40 },
number = { 7 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 43-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume40/number7/4980-7238/ },
doi = { 10.5120/4980-7238 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:27:29.001325+05:30
%A Rohan Rayarikar
%A Sanket Upadhyay
%A Deeshen Shah
%T An Encryption Algorithm for Secure Data Transmission
%J International Journal of Computer Applications
%@ 0975-8887
%V 40
%N 7
%P 43-47
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. We have proposed a new algorithm based on the concept used by Rijmen and Daemen (Rijndael algorithm), the founders of AES algorithm. The proposed algorithm encrypts and decrypts two 128 bits data simultaneously i.e. 256 bits data, thus providing strong encryption accompanied with complex processing. The proposed Feistal algorithm uses various invertible, self-invertible, and non-invertible components of modern encryption ciphers and key generation same as that of AES. This algorithm provides a secure, fast, and strong encryption of the data. There is a huge amount of confusion and diffusion of the data during encryption which makes it very difficult for an attacker to interpret the encryption pattern and the plain text form of the encrypted data. The proposed algorithm is also resistant to Brute-Force and pattern attacks.

References
  1. <ul style="text-align: justify;"> Security
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Algorithm S-Box Substitution Complement Feistal ELT ERT EBT LPT and RPT