Bitwise Operations Based Encryption and Decryption

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 1

Abstract

In this paper, variable block length based character/bit level ransformation has been proposed for encryption and cryption, where a block of characters /few bits has taken into account. he originated text is transformed into decimal values and assed to encoder module. In this module values are cluttered sing binary operations present in most systems with keys. This routine is based on feistel iteration using large umber of rounds for security justification to certain intensity and passed to the security module. This module performs conversion of values into octal base values and then padded ith a vector. When compared with other encryption schemes it provides more security even though keys are revealed. Since, one parameter namely vector ai alone been kept secret. The receiver passes the received cipher text to security module and yields the cipher decimal values. These values are transformed into a form of originated text.

Authors and Affiliations

K. Naveen Kumar , K. T. Praveen kumar , G. V. S. Raj Kumar , P. Chandra Sekhar

Keywords

Related Articles

Appearance Based Recognition of American Sign Language Using Gesture Segmentation

The work presented in this paper goals to develop a system for automatic translation of static gestures of alphabets in American Sign Language. In doing so three feature extraction methods and neural network is used to r...

Bilateral Filtering using Modified Fuzzy Clustering for Image Denoising

This paper presents a novel bilateral filtering using weighed cm algorithm based on Gaussian kernel function for image manipulations such as segmentation and denoising . Our roposed bilateral filtering consists of the...

ROBOT NAVIGATION USING IMAGE PROCESSING AND ISOLATED WORD RECOGNITION

In this paper, a practical implementation of image processing and isolated word recognition has been explained. A modeled vehicle has been driven autonomously on the road and can navigate on a road on its own, stop at ze...

On Human Intelligence

This paper presents some detailed discussions regarding the human natural intelligence, along with various types of intelligences. The authors have also given some important factors on which the intelligence depends. The...

Resolving Ambiguous Entity through Context Knowledge and Fuzzy Approach

Entity extraction is considered as a fundamental step in many text mining applications such as machine translation, text summarization and text categorization. However, the major challenging issue in extracting the entit...

Download PDF file
  • EP ID EP139754
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

K. Naveen Kumar, K. T. Praveen kumar, G. V. S. Raj Kumar, P. Chandra Sekhar (2011). Bitwise Operations Based Encryption and Decryption. International Journal on Computer Science and Engineering, 3(1), 50-54. https://europub.co.uk./articles/-A-139754