HRJ_Encryption: An ASCII Code Based Encryption Algorithm and its Implementation

被引:0
|
作者
Sharma, Hitesh Kumar [1 ]
Tomar, Ravi [1 ]
Patni, J. C. [1 ]
机构
[1] Univ Petr & Energy Studies, Ctr Informat Technol, Dehra Dun, India
来源
2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM) | 2015年
关键词
Plain Text; Cipher Text; Encryption; Decryption; ASCII Code; Secret Key;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The transmission of data over a common transmission media revolute the world of information sharing from personal desktop to cloud computing. But the risk of the information theft has increased in the same ratio by the third party working on the same channel. The risk can be avoided using the suitable encryption algorithm. Using the best suited algorithm the transmitted data will be encrypted before placing it on the common channel. Using the public key or the private key the encrypted data can be decrypted by the authenticated user. It will avoid the risk of information theft by the unauthenticated user. In this work we have proposed an encryption algorithm which uses the ASCII code to encrypt the plain text. The common key will he used by sender or receiver to encrypt and decrypt the text for secure communication.
引用
收藏
页码:1024 / 1027
页数:4
相关论文
共 50 条
  • [21] Implementation of El-Gamal algorithm for speech signals encryption and decryption
    Imran, Omar A.
    Yousif, Sura F.
    Hameed, Isam Salah
    Abed, Wisam Najm Al-Din
    Hammid, Ali Thaeer
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 1028 - 1037
  • [22] Data Security in Local Area Network Based on Fast Encryption Algorithm
    Ramesh, G.
    Umarani, R.
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 11 - +
  • [23] Hardware study and implementation of image encryption algorithm based on a hyperchaotic key generator
    Amdouni, Rim
    Hajjaji, Mohamed Ali
    Mtibaa, Abdellatif
    PHYSICA SCRIPTA, 2024, 99 (04)
  • [24] Substitution Encryption Algorithm Study for Embedded Mobile Code Protection
    Hu JingDe
    Shi Gang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, : 645 - 649
  • [25] A Novel DNA Computing based Encryption and Decryption Algorithm
    UbaidurRahman, Noorul Hussain
    Balamurugan, Chithralekha
    Mariappan, Rajapandian
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 463 - 475
  • [26] A NEW CHAOTIC ENCRYPTION ALGORITHM BASED ON THE ERGODICITY OF CHAOS
    Wang, Xing-Yuan
    Wang, Xiao-Juan
    INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2011, 25 (15): : 2047 - 2053
  • [27] Modified Vigenere Encryption Algorithm and its Hybrid Implementation with Base64 and AES
    Singh, Gurpreet
    Supriya
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 232 - 237
  • [28] A digital image encryption algorithm based on chaotic mapping
    Deng, Zhijuan
    Zhong, Shaojun
    JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2019, 13 : 1 - 11
  • [29] An Image Encryption Algorithm Based on Chaos
    Jin, Yong-Xian
    Guan, Yi-Sheng
    Zheng, Lin
    ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 3, 2011, 106 : 493 - 497
  • [30] A Kind of Encryption Method of QR Code based on ECA State Ring
    Yu Guang
    Shi Yunbo
    Che Chang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 285 - 294