We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

An Encryption Algorithm for Secure Data Transmission

by Rohan Rayarikar, Sanket Upadhyay, Deeshen Shah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 40 - Number 7
Year of Publication: 2012
Authors: Rohan Rayarikar, Sanket Upadhyay, Deeshen Shah
10.5120/4980-7238

Rohan Rayarikar, Sanket Upadhyay, Deeshen Shah . An Encryption Algorithm for Secure Data Transmission. International Journal of Computer Applications. 40, 7 ( February 2012), 43-47. DOI=10.5120/4980-7238

@article{ 10.5120/4980-7238,
author = { Rohan Rayarikar, Sanket Upadhyay, Deeshen Shah },
title = { An Encryption Algorithm for Secure Data Transmission },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 40 },
number = { 7 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 43-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume40/number7/4980-7238/ },
doi = { 10.5120/4980-7238 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:27:29.001325+05:30
%A Rohan Rayarikar
%A Sanket Upadhyay
%A Deeshen Shah
%T An Encryption Algorithm for Secure Data Transmission
%J International Journal of Computer Applications
%@ 0975-8887
%V 40
%N 7
%P 43-47
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. We have proposed a new algorithm based on the concept used by Rijmen and Daemen (Rijndael algorithm), the founders of AES algorithm. The proposed algorithm encrypts and decrypts two 128 bits data simultaneously i.e. 256 bits data, thus providing strong encryption accompanied with complex processing. The proposed Feistal algorithm uses various invertible, self-invertible, and non-invertible components of modern encryption ciphers and key generation same as that of AES. This algorithm provides a secure, fast, and strong encryption of the data. There is a huge amount of confusion and diffusion of the data during encryption which makes it very difficult for an attacker to interpret the encryption pattern and the plain text form of the encrypted data. The proposed algorithm is also resistant to Brute-Force and pattern attacks.

References
  1. <ul style="text-align: justify;"> Security
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Algorithm S-Box Substitution Complement Feistal ELT ERT EBT LPT and RPT