CFP last date
20 June 2024
Reseach Article

Modern Encryption and Decryption Algorithm based on ASCII Value and Binary Operations

by Deepak, Parveen
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 172 - Number 1
Year of Publication: 2017
Authors: Deepak, Parveen
10.5120/ijca2017915060

Deepak, Parveen . Modern Encryption and Decryption Algorithm based on ASCII Value and Binary Operations. International Journal of Computer Applications. 172, 1 ( Aug 2017), 30-34. DOI=10.5120/ijca2017915060

@article{ 10.5120/ijca2017915060,
author = { Deepak, Parveen },
title = { Modern Encryption and Decryption Algorithm based on ASCII Value and Binary Operations },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 172 },
number = { 1 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume172/number1/28217-2017915060/ },
doi = { 10.5120/ijca2017915060 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:19:11.683879+05:30
%A Deepak
%A Parveen
%T Modern Encryption and Decryption Algorithm based on ASCII Value and Binary Operations
%J International Journal of Computer Applications
%@ 0975-8887
%V 172
%N 1
%P 30-34
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is the most important issue from last few decades. Cryptography plays an important role in security. Encryption and Decryption came as a solution against security threats. There are so many proposed algorithms by researchers like AES,DES,RSA and many more but they are lacking somewhere in terms of security. Therefore cryptography demands such encryption and decryption algorithms which are real hard to crack. In this paper, an algorithm has been proposed based on ASCII values and binary operations for both encryption and decryption to enhance the security so that the attackers might not easily crack the logic to reach the original message sent via network.

References
  1. New Tools in Cryptography: Mutually Indepent Commitments, Tweakable Block Ciphers, and Plaintext Awareness via Key Registration by Moses Liskov.
  2. Cryptography and Machine Learning Ronald L. Rivest* Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, MA 02139
  3. The RC5 Encryption Algorithm Ronald L Rivest MIT Laboratory for Computer Science Technology Square, Cambridge, Mass. 02139.
  4. D. E. Denning. Cryptography and Data Security. Addison-Wesley, Reading, Mass., 1982.
  5. A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms.
  6. Obaida Mohammad Awad Al-Hazaimeh “A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA” International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
  7. Dr. Prerna Mahajan & Abhishek Sachdeva IITM, India “A Study of Encryption Algorithms AES, DES and RSA for Security” Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013
  8. Warakorn Srichavengsup and Wimol San-Um “Data Encryption Scheme Based on Rules of Cellular Automata and Chaotic Map Function for Information Security” International Journal of Network Security, Vol.18, No.6, PP.1130-1142, Nov. 2016
Index Terms

Computer Science
Information Sciences

Keywords

ASCII Binary Encryption Decryption Symmetric Encryption Algorithm Plain Text Cipher Text