CFP last date
20 May 2024
Reseach Article

Enciphering using Elegant Pairing Functions and Logical Operators

by B. Reddaiah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 150 - Number 9
Year of Publication: 2016
Authors: B. Reddaiah
10.5120/ijca2016911618

B. Reddaiah . Enciphering using Elegant Pairing Functions and Logical Operators. International Journal of Computer Applications. 150, 9 ( Sep 2016), 7-12. DOI=10.5120/ijca2016911618

@article{ 10.5120/ijca2016911618,
author = { B. Reddaiah },
title = { Enciphering using Elegant Pairing Functions and Logical Operators },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 150 },
number = { 9 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 7-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume150/number9/26119-2016911618/ },
doi = { 10.5120/ijca2016911618 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:55:29.459206+05:30
%A B. Reddaiah
%T Enciphering using Elegant Pairing Functions and Logical Operators
%J International Journal of Computer Applications
%@ 0975-8887
%V 150
%N 9
%P 7-12
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As technology started growing verbal exchange became a principal method of exchanging data. With the introduction of web and pay out programs protection problems are more difficult and elaborate. Secure correspondence is a remarkable worry by which individuals can communicate data to changing degrees of assurance that outsiders can't catch the data that is transmitted over system. Consequently data security is an essential thought in nowadays. Cryptography and data security is growing more to deal with authorized security for systems. In this work the proposed algorithm makes use of basic encryption methods like substitution, transposition, bitwise logical operations together with pairing operate to encrypt the information. The algorithm itself generates the important key from simple text and hides inside plaintext.

References
  1. B. Reddaiah, R Pradeep kumar Reddy, S. Hari Krishna “Enciphering using Bit–wise logical operators and paring function with text generated hidden key,” IJCA (0975-8887), Vol. 121, No. 8, July 2015: pp. 30-35.
  2. S. William, Cryptography and Network Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc., 1999 pp 23-50
  3. S. Hebert, “A Brief History of Cryptography”, an article available at http://cybercrimes.net/aindex.html
  4. Behrouz A. Forouzan, Cryptography and Network Security, Special Indian Edition, TATA McGraw Hill.
  5. K. Gary, “An Overview of Cryptography”, an article available at www.garykessler.net/library/crypto.html
  6. “Basic Cryptographic Algorithms”, an article available at www.itsc.state.md.us/oldsite/info/InternetSecurity/Crypto/CryptoIntro.html#Algorthms
  7. Nidhi Singhal, J.P.S.Raina “Comparative Analysis of AES and RC4 Algorithms for Better utilization” International Journal of Computer Trends and Technology-July to Aug Issue 2011.
  8. D. KHAN, “The Codebreakers”, Macmillan Publishing Company, New York, 1967.
  9. P. P Charles & P. L. Shari, “Security in Computing: 4th edition”, Prentice-Hall, Inc.,2008.
  10. A. S. Tanenbaum, “Modern Operating Systems”, Prentice Hall, 2003.
  11. Janan Ateya Mahdi, Design and Implementation of proposed B-R Encryption Algorithm, IJCCCE, VOL.9, NO.1, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Elegant pairing function Symmetric Key