CFP last date
20 May 2024
Reseach Article

Enhanced Bit Enciphering using Gates, Mathematical Operations and Text Key

by B. Reddaiah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 26
Year of Publication: 2018
Authors: B. Reddaiah
10.5120/ijca2018918111

B. Reddaiah . Enhanced Bit Enciphering using Gates, Mathematical Operations and Text Key. International Journal of Computer Applications. 182, 26 ( Nov 2018), 5-10. DOI=10.5120/ijca2018918111

@article{ 10.5120/ijca2018918111,
author = { B. Reddaiah },
title = { Enhanced Bit Enciphering using Gates, Mathematical Operations and Text Key },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2018 },
volume = { 182 },
number = { 26 },
month = { Nov },
year = { 2018 },
issn = { 0975-8887 },
pages = { 5-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number26/30138-2018918111/ },
doi = { 10.5120/ijca2018918111 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:12:31.405928+05:30
%A B. Reddaiah
%T Enhanced Bit Enciphering using Gates, Mathematical Operations and Text Key
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 26
%P 5-10
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

E-commerce is field that is growing all over the world at a greater speed. This is possible with extension of internet services to each and every corner of the world. As the users are moving towards online business and increasing in number day by day towards online services there is every need to have security at various levels in electronic business. Security mechanisms play a vital role in providing security to online business applications and there is need to improve security services periodically to counter the activities of hackers. In this paper concept of gates and different mathematical operations are used in existing RC2 model to extend the security and examine the possibility of inclusion of different operations in existing systems.

References
  1. R. Pradeep Kumar Reddy, B. Reddaiah, C. Nagaraju,December 2014, “A Review on Security Issues Related to Computer Networks”,International Journal of Scintific Engineering and Technology Research(IJSETR), Voll.03 Issue 46, 9388-9393.
  2. B. Reddaiah, R. Pradeep Kumar Reddy, S. Hari Krishna, July 2015, “Enciphering Using Bit-Wise Logical Operators and Pairing Function with Text Generated Hidden Key”, International Journal of Computer Applications, Vol.121 Issue 8, 30-35.
  3. S. Hebert, “A Brief History of Cryptography”, an article available at http://cybercrimes.net/aindex.html.
  4. P. P Charles & P. L. Shari, “Security in Computing: 4th edition”, Prentice-Hall, Inc.,2008.
  5. “Basic Cryptography Algorithms”, an article available at www.itsc.state.md.us/oldsite/info/InternetSecurity/Crypto/CryptoIntro.html#Algorithms
  6. K. Gary, “An Overview of Cryptography “, an article available at www.garykessler.net/library/crypto.html.
Index Terms

Computer Science
Information Sciences

Keywords

Plain text Cipher text Key Encryption Decryption Gates Arithmetic operations.