Javascript must be enabled to continue!
Symmetric Encryption Algorithm using ASCII Values
View through CrossRef
Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm. Encryption is a method in which user’s confidential data or private data is encoded to cipher text and this text can be read only if it is decrypted by authorized user using the right key. Cipher text can be decoded back to plain text, only by the authorized users using a right key. Various encryption algorithm are used to encrypt the plain text to cipher text and the cipher text is decrypted back to plain text by authorized user using right key. The symmetric key algorithm uses the same key to encrypt the plain text and decrypt the cipher text. In this paper we have proposed new symmetric algorithm using ASCII value. The plain text using key and ASCII values is converted to cipher text. Encryption algorithm sends cipher text and minimum value to the authorized receiver. Receiver decrypts the cipher text to plain text using same key and minimum value. In this algorithm sequence of five pseudo random number is generated and sum of this five pseudo random number is added to the obtained decimal value. Seed to generate common sequence of pseudo random number is kept secret between sender and receiver. Proposed algorithm support variable key length and plain text size. This algorithms performs faster when text is small message, but the execution time increases as the plain text size increases. This algorithm can be used to send small messages in a secured way. .
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Title: Symmetric Encryption Algorithm using ASCII Values
Description:
Cryptography at its very core is nothing but math - pure, simple, undiluted math.
Math created algorithms that are basics for various encryption algorithm.
Encryption is a method in which user’s confidential data or private data is encoded to cipher text and this text can be read only if it is decrypted by authorized user using the right key.
Cipher text can be decoded back to plain text, only by the authorized users using a right key.
Various encryption algorithm are used to encrypt the plain text to cipher text and the cipher text is decrypted back to plain text by authorized user using right key.
The symmetric key algorithm uses the same key to encrypt the plain text and decrypt the cipher text.
In this paper we have proposed new symmetric algorithm using ASCII value.
The plain text using key and ASCII values is converted to cipher text.
Encryption algorithm sends cipher text and minimum value to the authorized receiver.
Receiver decrypts the cipher text to plain text using same key and minimum value.
In this algorithm sequence of five pseudo random number is generated and sum of this five pseudo random number is added to the obtained decimal value.
Seed to generate common sequence of pseudo random number is kept secret between sender and receiver.
Proposed algorithm support variable key length and plain text size.
This algorithms performs faster when text is small message, but the execution time increases as the plain text size increases.
This algorithm can be used to send small messages in a secured way.
.
Related Results
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract
This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...
Location-Based Cryptographic Techniques for Data Protection
Location-Based Cryptographic Techniques for Data Protection
Data protection has become one of the significant issues in cloud computing when end users must rely on their cloud providers for security purposes. Cloud providers never guarantee...
Automatic Selective Encryption of DICOM Images
Automatic Selective Encryption of DICOM Images
Securing DICOM images is essential to protect the privacy of patients, especially in the era of telemedicine and eHealth/mHealth. This increases the demand for rapid security. Neve...

