Encryption using XOR based Extended Key for Information Security – A Novel Approach

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 1

Abstract

The explosive growth of information, places a high demand for Information Security. Information Security deals with securing the information from unauthorized access or misuse of information either intentionally or accidentally. Information may be represented in many forms like text, documents, audio, video, images or maps. The standard and widely used form is documents. The objective of our work is to secure information present in these documents especially in a shared environment like peer-to- peer environment. We have proposed a novel symmetric encryption method which uses XOR based extended key to encrypt all characters which includes alphabets, numerals and special characters. Our approach differs from traditional approaches which rely on numeric key values. [6], [1]. Our intention is to strengthen the confusion which inherently makes the decryption a challenging task.

Authors and Affiliations

E. Anupriya , Sachin Soni , Amit Agnihotri , Sourabh Babelay

Keywords

Related Articles

IMPROVED PART IDENTIFICATION AND REQUISITION USING 3D ILLUSTRATED PARTS CATALOGUES IN AEROSPACE AND DEFENSE

Part identification and requisition is being carried out in aerospace and defense using Illustrated Parts Catalogues that are in hardcopy format. This paper introduces the concept of 3D Illustrated Parts Catalogues, whic...

Comparative Study of Three Declarative Knowledge Representation Techniques

In artificial intelligence to solve the problem user require a knowledge base, consist all information related to problem domain and a method for manipulating the knowledge for finding the solution. For better result kno...

A Survey on the Applications of Bee Colony Optimization Techniques

In this paper an overview of the areas where the Bee Colony Optimization (BCO) and its variants are applied have been given. Bee System was identified by Sato and Hagiwara in 1997 and the Bee Colony Optimization (BCO) wa...

MICROCONTROLLER PIN CONFIGURATION TOOL

Configuring the micro controller with large number of pins is tedious. Latest Infine on microcontroller contains more than 200 pins and each pin has classes of signals. Therefore the complexity of the microcontroller is...

Statistical study of performance metrics of Adaptive Fault Tolerant Replication Routing Protocol for MANET

Ad hoc networks are multi-hop wireless networks having dynamic topology due to node mobility. Routing protocols for such networks should be able to respond rapidly to topological changes. Designing and analyzing routing...

Download PDF file
  • EP ID EP145004
  • DOI -
  • Views 103
  • Downloads 0

How To Cite

E. Anupriya, Sachin Soni, Amit Agnihotri, Sourabh Babelay (2011). Encryption using XOR based Extended Key for Information Security – A Novel Approach. International Journal on Computer Science and Engineering, 3(1), 146-154. https://europub.co.uk./articles/-A-145004