CFP last date
22 April 2024
Reseach Article

Algorithm for Text Data Encryption by Position Swapping based on LFSR Pseudorandom Key Generation

by Nitin Kaul, Shikha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 5
Year of Publication: 2015
Authors: Nitin Kaul, Shikha
10.5120/20334-2510

Nitin Kaul, Shikha . Algorithm for Text Data Encryption by Position Swapping based on LFSR Pseudorandom Key Generation. International Journal of Computer Applications. 116, 5 ( April 2015), 28-32. DOI=10.5120/20334-2510

@article{ 10.5120/20334-2510,
author = { Nitin Kaul, Shikha },
title = { Algorithm for Text Data Encryption by Position Swapping based on LFSR Pseudorandom Key Generation },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 5 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number5/20334-2510/ },
doi = { 10.5120/20334-2510 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:56:16.252773+05:30
%A Nitin Kaul
%A Shikha
%T Algorithm for Text Data Encryption by Position Swapping based on LFSR Pseudorandom Key Generation
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 5
%P 28-32
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data security is one of the main issues as the technology is rising. Daily infinite amount of data is being transmitted over the internet, through mobile phones, laptops, and it is of more concern that, that data should be secured. Cryptography gives us number of ways by which the security can be enhanced. Number of encryption algorithms and protocols are there, by which the data can be made more and more secure. Cryptography is the science where security engineering meets mathematics. In this paper, a basic two level encryption algorithm has been proposed based on the position swapping of data values according the values of key and LFSR pseudorandom sequence generation for making the transmission of text data secure.

References
  1. Bruice Schneier, Applied Cryptography, 2nd edition, Wiley Publication.
  2. C. K. Shyamala, N Harini, Dr T. R. Padmanabhan, Cryptography and Security, 1st edition, Wiley India Publication.
  3. Ayushi, "A Symmetric Key Cryptographic Algorithm" , International Journal of Computer Applications, Volume 1- No. 15, 2010.
  4. Amrita Sahu, Yogesh Bahendwar, Swati Verma, Prateek Verma, "Proposed Method of Cryptographic Key Generation for Securing Digital Image", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2 Issue 10, October 2012.
  5. Dr. S. A. M Rizvi, Neeta Wadhwa, "Analysis of Substitution and Permutation from Cryptanalysis Perspective", Proceedings of ISCET-2010.
  6. Fred Cohen, Introductory Information Protection- Chapter 2, All. Net, copyright ©, 1990, 1995
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography LFSR pseudorandom key Encryption Decryption Text data