International Conference on Computing, Communication and Sensor Network |
Foundation of Computer Science USA |
CCSN2012 - Number 4 |
March 2013 |
Authors: Subhranil Som, Mandira Banerjee |
df8043a8-9304-4c62-bee1-d17488659acb |
Subhranil Som, Mandira Banerjee . Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function. International Conference on Computing, Communication and Sensor Network. CCSN2012, 4 (March 2013), 1-5.
In this paper a new algorithm for encryption and decryption is introduced. The process of substitution and genetic function is the core of the proposed algorithm. In this encryption technique two keys are required for the encryption or decryption of a message. Input stream will be produced intermediate cipher text on which two stages of crossover will be used in the process of encryption and decryption to produce final cipher text.