A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 9
Abstract
Encryption is the process of transforming plaintext into the ciphertext where plaintext is the input to the encryption process and ciphertext is the output of the encryption process. Decryption is the process of transforming ciphertext into the plaintext where ciphertext is the input to the decryption process and plaintext is the output of the decryption process. There are various encryption algorithms exist classified as symmetric and asymmetric encryption algorithms. Here, I present an algorithm for data encryption and decryption which is based on ASCII values of characters in the plaintext. This algorithm is used to encrypt data by using ASCII values of the data to be encrypted. The secret used will be modifying o another string and that string is used as a key to encrypt or decrypt the data. So, it can be said that it is a kind of symmetric encryption algorithm because it uses same key for encryption and decryption but by slightly modifying it. This algorithm operates when the length of input and the length of key are same.
Authors and Affiliations
Akanksha Mathur
Wearable technology a new paradigm in Educational Universities
Wearable technology, making a mark as the emerging technology where the goal of computing is to minimize the time and accessing the technology everywhere. It helps students in many ways. For identifying buildings by comb...
Efficient construction of Optimal Binary Search Trees using Data Preprocessing to improve Quality and Attribute Post computing to save Space and time through modified Dynamic Programming Technique
There are various methods of handling Optimal Binary search trees in order to improve the performance. One of the methods is Dynamic programming which incurs O(n3) time complexity to store involved computations in a tabl...
Selection of a Checkpoint Interval in Coordinated Checkpointing Protocol for Fault Tolerant Open MPI
The goal of this paper is to address the selection of efficient checkpoint interval which reduces the total overhead cost due to the checkpointing and restarting of the applications in a distributed system environment....
Comparative BER Performance of M-ary QAM-OFDM System in AWGN & Multipath Fading Channel
OFDM (Orthogonal Frequency Division Multiplexing) is a multicarrier technique where linearly modulated data streams are divided into number of substreams each occupying a bandwidth less than the total bandwidth of the si...
A Survey on Early Determination of Zero Quantized Coefficients in Video Coding
In video encoding, there are a large number of discrete cosine transform (DCT) coefficients of the prediction residue which are quantized to zeros. Therefore, it is desired to design a method which can early detect zero...