HRJ_Encryption: An ASCII Code Based Encryption Algorithm and its Implementation

被引:0
|
作者
Sharma, Hitesh Kumar [1 ]
Tomar, Ravi [1 ]
Patni, J. C. [1 ]
机构
[1] Univ Petr & Energy Studies, Ctr Informat Technol, Dehra Dun, India
来源
2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM) | 2015年
关键词
Plain Text; Cipher Text; Encryption; Decryption; ASCII Code; Secret Key;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The transmission of data over a common transmission media revolute the world of information sharing from personal desktop to cloud computing. But the risk of the information theft has increased in the same ratio by the third party working on the same channel. The risk can be avoided using the suitable encryption algorithm. Using the best suited algorithm the transmitted data will be encrypted before placing it on the common channel. Using the public key or the private key the encrypted data can be decrypted by the authenticated user. It will avoid the risk of information theft by the unauthenticated user. In this work we have proposed an encryption algorithm which uses the ASCII code to encrypt the plain text. The common key will he used by sender or receiver to encrypt and decrypt the text for secure communication.
引用
收藏
页码:1024 / 1027
页数:4
相关论文
共 50 条
  • [31] Access Control System Based on Encryption in QR-Code Technology
    Susukailo, Vitalii
    Lakh, Yuriy
    PROCEEDINGS OF THE 2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), 2018, : 158 - 161
  • [32] Implementation Of Node Energy Based On Encryption Keying
    Bhargavi, S.
    Ranjitha, B. T.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (08) : 33 - 39
  • [33] PARTIALLY PIPELINED VLSI IMPLEMENTATION OF BLOWFISH ENCRYPTION/DECRYPTION ALGORITHM
    Karthigaikumar, P.
    Baskaran, K.
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2010, 10 (03) : 327 - 341
  • [34] A High Performance Hardware Implementation Image Encryption With AES Algorithm
    Farmani, Ali
    Jafari, Mohamad
    Miremadi, Seyed Sohrab
    THIRD INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2011), 2011, 8009
  • [35] A meticulous implementation of RSA Algorithm using MATLAB for Image Encryption
    Mukherjee, Shankha
    Chakrabarti, Shakya
    Sinha, Souvik
    Mukhopadhyay, Tamal
    2017 1ST INTERNATIONAL CONFERENCE ON ELECTRONICS, MATERIALS ENGINEERING & NANO-TECHNOLOGY (IEMENTECH), 2017,
  • [36] Designing a New Data Encryption Algorithm Using a Genetic Code Method
    Zengin, Mustafa
    Albayrak, Zafer
    ACTA POLYTECHNICA HUNGARICA, 2022, 19 (02) : 235 - 252
  • [37] A new algorithm for encryption/decryption Based on Artificial Immunity Theory
    Yue Ming-yu
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1839 - 1842
  • [38] Improved SERPENT Algorithm: Design to RGB Image Encryption Implementation
    Shah, Tariq
    Ul Haq, Tanveer
    Farooq, Ghazanfar
    IEEE ACCESS, 2020, 8 : 52609 - 52621
  • [39] Novel Algorithm in Symmetric Encryption (NASE) Based on Feistel Cipher
    Baker, Safiah I. Bani
    Al-Hamami, Alaa Hussein
    2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, : 191 - 196
  • [40] An Image Encryption Algorithm Based on HNN with Memristor
    Liu, Yian
    Hu, Hao
    Gao, Ya
    Hu, Shaogang
    Yu, Qi
    Chen, Tupei
    Liu, Yang
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2025, 35 (04):