Encryption Model Converting Secret Message to a Single Character

Authors

  • I. Maria Vincy  M.Phil Research Scholar, Department of Computer Science, Alagappa University, Karaikudi, Tamilnadu, India
  • S. S. Dhenakaran  Professor, Department of Computer Science, Alagappa University, Karaikudi, Tamilnadu, India

DOI:

https://doi.org/10.32628/CSEIT206662

Keywords:

Encryption, Message Size, Encryption Algorithm, Single Character, Key Generator, Decryption

Abstract

A lot of information is shared across the internet in day-by-day activities, which leads someone or hackers to access other personnel's secure information. In these cases, encryption is a well-known solution for ensuring internet data confidentiality and privacy. In order to make it impossible for someone to decode the information, encryption hides original information in an unintelligible form of information. This paper proposed a refined cryptographic algorithm to secure confidentiality information. The resultant of the proposed encryption algorithm generates a single character, which may be an alphabet or number, or special character. The key size required may be the size of the input information.

References

  1. Bangera, K. N., Reddy, N. V. S., Paddambail, Y., & Shivaprasad, G. (2017). Multilayer security using RSA cryptography and dual audio steganography. 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 492–495. https://doi.org/10.1109/RTEICT.2017.8256645
  2. Panda, P. K., & Chattopadhyay, S. (2017). A hybrid security algorithm for RSA cryptosystem. 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), 1–6. https://doi.org/10.1109/ICACCS.2017.8014644
  3. Joshi, A., Wazid, M., & Goudar, R. H. (2015). An Efficient Cryptographic Scheme for Text Message Protection Against Brute Force and Cryptanalytic Attacks. Procedia Computer Science, 48, 360–366. https://doi.org/10.1016/j.procs.2015.04.194
  4. Agrawal, E., & Pal, P. (2017). A Secure and Fast Approach for Encryption and Decryption of Message Communication. International Journal of Engineering Science and Computing, 7, 5.
  5. KumarPandey, K., Rangari, V., & Kumar Sinha, S. (2013). An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security. International Journal of Computer Applications, 74(20), 29–33. https://doi.org/10.5120/13028-0215
  6. Sadhu Narayana Naidu. (2019). Secure Sharing of Data using an Algorithm Namely KAN. International Journal of Innovative Technology and Exploring Engineering, 8(9), 2959–2966. https://doi.org/10.35940/ijitee.I8523.078919
  7. Roopali soni, S. V., Rajnish Choubey. (n.d.). An Efficient Developed New Symmetric Key Cryptography Algorithm for Information Security. International Journal of Emerging Technology and Advanced Engineering.
  8. Kumari, M. (n.d.). DATA ENCRYPTION AND DECRYPTION USING GRAPH PLOTTING. 11.
  9. Kumar, N., & Chaudhary, P. (2016). Implementation of Modified RSA Cryptosystem for Data Encryption and Decryption based on n Prime number and Bit Stuffing. Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies - ICTCS ’16, 1–6. https://doi.org/10.1145/2905055.2905180

Downloads

Published

2020-12-30

Issue

Section

Research Articles

How to Cite

[1]
I. Maria Vincy, S. S. Dhenakaran, " Encryption Model Converting Secret Message to a Single Character" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 6, pp.316-322, November-December-2020. Available at doi : https://doi.org/10.32628/CSEIT206662