CFP last date
20 May 2024
Reseach Article

Cryptographic Technique: Base Change Method

by Prabhas Tiwari, Nishtha Madaan, Md.tabrez Nafis
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 14
Year of Publication: 2015
Authors: Prabhas Tiwari, Nishtha Madaan, Md.tabrez Nafis
10.5120/20813-3150

Prabhas Tiwari, Nishtha Madaan, Md.tabrez Nafis . Cryptographic Technique: Base Change Method. International Journal of Computer Applications. 118, 14 ( May 2015), 13-16. DOI=10.5120/20813-3150

@article{ 10.5120/20813-3150,
author = { Prabhas Tiwari, Nishtha Madaan, Md.tabrez Nafis },
title = { Cryptographic Technique: Base Change Method },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 14 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 13-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number14/20813-3150/ },
doi = { 10.5120/20813-3150 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:01:41.834983+05:30
%A Prabhas Tiwari
%A Nishtha Madaan
%A Md.tabrez Nafis
%T Cryptographic Technique: Base Change Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 14
%P 13-16
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is the study of cryptographic algorithms that include encryption and decryption both. The importance of cryptography is discussed. The problem statement here is, to form a cryptographic algorithm that uses randomization. Usage of high amount of randomization makes it tougher for one to crack the cipher text. In our algorithm, we have made use of two concepts, usage of the alphabets' table from Caesar's Cipher and XOR decoding method using Vignere Cipher. Additional knowledge of Number Systems in Computers is used. The algorithm is highly flexible. Since usage of number system theory has been made, the encoder may make use of any of the following system during encoding: BINARY, OCTAL, HEXA DECIMAL. Further, any of these systems can be used in sub parts of the plain text, if the pre-process knowledge stored in K1 can be varied to change the base and XOR operation results.

References
  1. Web Source : http://www. advocate. com/world/2014/08/22/queens-decree-alan-turing-now-officially-pardoned
  2. Imperial College of London, Web Source: http://www. doc. ic. ac. uk/~ajs300/security/CIA. htm
  3. Electronic Frontier Foundation (1998). Cracking DES - Secrets of Encryption Research, Wiretap Politics & Chip Design. Oreilly & Associates Inc. (ISBN 1-56592-520-3)
  4. William Stallings (2003), Cryptography and Network Security, 3 rd edition, Pearson Education
  5. Plain Text Basesd Trasposition Method, Prof. S. D. Padiya* Prof. D. N. Dakhane, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, July 2012 ISSN: 2277 128X
  6. Atul Kahate (2009), Cryptography and Network Security, 2 nd edition, McGraw-Hill.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Encrypt Decrypt Cipher Text Plain Text Data Security