Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Encoding Algorithm using Bit Level Encryption and Decryption Technique

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Jayashree Singha, Saikat Jana, Souvik Singha
10.5120/ijca2017912975

Jayashree Singha, Saikat Jana and Souvik Singha. Encoding Algorithm using Bit Level Encryption and Decryption Technique. International Journal of Computer Applications 160(2):23-26, February 2017. BibTeX

@article{10.5120/ijca2017912975,
	author = {Jayashree Singha and Saikat Jana and Souvik Singha},
	title = {Encoding Algorithm using Bit Level Encryption and Decryption Technique},
	journal = {International Journal of Computer Applications},
	issue_date = {February 2017},
	volume = {160},
	number = {2},
	month = {Feb},
	year = {2017},
	issn = {0975-8887},
	pages = {23-26},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume160/number2/27046-2017912975},
	doi = {10.5120/ijca2017912975},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Encryption is a process in which the sender encrypts or scrambles the message in such a way that only the recipient will be able to decrypt the message with the knowledge of the proper key. With the growth of internet, the need for secure data transmission become more essential and important, as security is a major concern in the internet world. So the plain text should be codified by the process of encryption. Different types of data have their own features, thus different techniques should be used to protect confidential data from unauthorized access. In this paper proposed in bit level encryption and decryption algorithm based on number of keys which can encrypt the 8 bit binary no to its corresponding 8 bit cipher text and a decryption algorithm which can convert that 8 bit cipher text to its corresponding 8 bit original no. It can also be extended to 16, 32 bit binary number.

References

  1. Alfred J. Menezes , Paul C.van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography, Taylor & Francis Ltd.
  2. Manas Paul, Tanmay Bhattacharya, Suvajit Pal and Ranit Saha, “A novel generic session based bit level encryption technique to enhance information security” , International Journal of Computer Science and Information Security,Vol. 3, No. 1, 2009.
  3. Neeraj Khanna, Dripto Chatterjee and Asoke Nath, “Bit level encryption standard (BLES): Version-I”, International Journal of Computer Applications (0975 – 8887) Volume 52– No.2, August 2012.
  4. Gaurav Bhadra, T. Baia and S. Banik, “Bit level encryption standard (BLES): Version-II”, Information and Communication Technologies (WICT), 2012 World Congress on,  30 Oct.-2 Nov. 2012.
  5. Manas Paul and J.K.Mandal, “A permutative cipher technique(PCT) to enhance the security of network based transmission”, Proceedings of 2nd National Conference on Computing for Nation Development, Bharati Vidyapeeth’s Institute of Computer Applications and Management, New Delhi, India, pp. 197-202,08th-09th February 2008, pp. 217-222.
  6. Douglas R Stinson, Cryptography:Theory and Practice, CRC press.
  7. Manas Paul and Jyotsna Kumar Mandal, “A novel symmetric key cryptographic technique at bit level based on spiral matrix concept”, International Conference on Information Technology, Electronics and Communications (ICITEC – 2013), Bangalore, India, March 30 – 31, 2013.
  8. Hsien-Chou Liao and Yun-Hsiang Chao, "A new data encryption algorithm based on the location of mobile users", Information Technology Journal 7 (1), pp. 63-69, 2008.
  9. J.K. Mandal and S. Dutta, “A universal bit-level encryption technique”, Seventh Vigyan Congress, Jadavpur University, India, 28Feb to Ist March, 2000.
  10. J.K. Mandal and P.K. Jha, “Encryption through cascaded arithmetic operation on pair of bits and key rotation (CAOPBKR)”, National Conference of Recent Trends in Intelligent Computing (RTIC-06), Kalyani Government Engineering College, Kalyani, Nadia, 17-19 Nov. 2006,India, pp 212-220.
  11. Satyaki Roy , Shalabh Agarwal, Asoke Nath, Navajit Maitra and Joyshree Nath,” Ultra encryption algorithm (UEA): Bit level symmetric key cryptosystem with randomized bits and feedback mechanism”, International Journal of Computer Applications (0975 – 8887) Volume 49– No.5, July 2012.
  12. Asoke Nath, Saima Ghosh and Meheboob Alam Mallik,” Symmetric key cryptography using random key generator”,“  Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15,2010,Vol-2,239-244.[13] Neeraj Khanna, Joel James, Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti and Asoke Nath, “New symmetric key cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm”, Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130.
  13. Debanjan Das, Joyshree Nath, Megholova Mukherjee, Neha Chaudhury and Asoke Nath, “An integrated symmetric key cryptography algorithm using generalized vernam cipher method and DJSA method: DJMNA symmetric key algorithm”, Proceedings of IEEE conference WICT-2011 held at Mumbai University Dec 11-14,2011.
  14. Trisha Chatterjee, Tamodeep Das, Joyshree Nath, Shayan Dey and Asoke Nath, “Symmetric key cryptosystem using combined cryptographic algorithms- generalized modified vernam cipher method, MSA method and NJJSAA method: TTJSA algorithm”, Proceedings of IEEE International conference : World Congress WICT-2011 held at Mumbai University 11-14 Dec, 2011, Page No. 1179-1184(2011).
  15. Willian Stallings, Cryptography and Network, Prentice Hall of India.
  16. J.K. Mandal and P.K. Jha, “Encryption through cascaded recursive key rotation of a session key with transposition and addition of blocks (CRKRTAB)”, Proceed. National Conference of Recent Trends in Information Systems (ReTIS-06), IEEE Calcutta Chapter & Jadavpur University, 14-15 July, 2006.
  17. FOROUZAN, CRYPTOGRAPHY AND NETWORK SECURITY, McGraw Hill Education.
  18. Abhijit Das and C. E. Veni Madhavan, Public-Key Cryptography : Theory and Practice,  Pearson India.

Keywords

Bit level encryption; plaint text; cipher text; encoding; decoding