Encryption Model Converting Secret Message to a Single Character
DOI:
https://doi.org/10.32628/CSEIT206662Keywords:
Encryption, Message Size, Encryption Algorithm, Single Character, Key Generator, DecryptionAbstract
A lot of information is shared across the internet in day-by-day activities, which leads someone or hackers to access other personnel's secure information. In these cases, encryption is a well-known solution for ensuring internet data confidentiality and privacy. In order to make it impossible for someone to decode the information, encryption hides original information in an unintelligible form of information. This paper proposed a refined cryptographic algorithm to secure confidentiality information. The resultant of the proposed encryption algorithm generates a single character, which may be an alphabet or number, or special character. The key size required may be the size of the input information.
References
- Bangera, K. N., Reddy, N. V. S., Paddambail, Y., & Shivaprasad, G. (2017). Multilayer security using RSA cryptography and dual audio steganography. 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 492–495. https://doi.org/10.1109/RTEICT.2017.8256645
- Panda, P. K., & Chattopadhyay, S. (2017). A hybrid security algorithm for RSA cryptosystem. 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), 1–6. https://doi.org/10.1109/ICACCS.2017.8014644
- Joshi, A., Wazid, M., & Goudar, R. H. (2015). An Efficient Cryptographic Scheme for Text Message Protection Against Brute Force and Cryptanalytic Attacks. Procedia Computer Science, 48, 360–366. https://doi.org/10.1016/j.procs.2015.04.194
- Agrawal, E., & Pal, P. (2017). A Secure and Fast Approach for Encryption and Decryption of Message Communication. International Journal of Engineering Science and Computing, 7, 5.
- KumarPandey, K., Rangari, V., & Kumar Sinha, S. (2013). An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security. International Journal of Computer Applications, 74(20), 29–33. https://doi.org/10.5120/13028-0215
- Sadhu Narayana Naidu. (2019). Secure Sharing of Data using an Algorithm Namely KAN. International Journal of Innovative Technology and Exploring Engineering, 8(9), 2959–2966. https://doi.org/10.35940/ijitee.I8523.078919
- Roopali soni, S. V., Rajnish Choubey. (n.d.). An Efficient Developed New Symmetric Key Cryptography Algorithm for Information Security. International Journal of Emerging Technology and Advanced Engineering.
- Kumari, M. (n.d.). DATA ENCRYPTION AND DECRYPTION USING GRAPH PLOTTING. 11.
- Kumar, N., & Chaudhary, P. (2016). Implementation of Modified RSA Cryptosystem for Data Encryption and Decryption based on n Prime number and Bit Stuffing. Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies - ICTCS ’16, 1–6. https://doi.org/10.1145/2905055.2905180
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.