A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 9
Abstract
Encryption is the process of transforming plaintext into the ciphertext where plaintext is the input to the encryption process and ciphertext is the output of the encryption process. Decryption is the process of transforming ciphertext into the plaintext where ciphertext is the input to the decryption process and plaintext is the output of the decryption process. There are various encryption algorithms exist classified as symmetric and asymmetric encryption algorithms. Here, I present an algorithm for data encryption and decryption which is based on ASCII values of characters in the plaintext. This algorithm is used to encrypt data by using ASCII values of the data to be encrypted. The secret used will be modifying o another string and that string is used as a key to encrypt or decrypt the data. So, it can be said that it is a kind of symmetric encryption algorithm because it uses same key for encryption and decryption but by slightly modifying it. This algorithm operates when the length of input and the length of key are same.
Authors and Affiliations
Akanksha Mathur
Brassinosteroid synthesis as context sensitive language acceptance problem
A biochemical system like brassinosteroid biosynthesis is not just an assembly of enzymes. In addition to the listing of the individual components, it is essential to understand how individual components dynamically inte...
Prediction and Analysis of students Behavior using BARC Algorithm
Educational Data mining is a recent trends where data mining methods are experimented for the improvement of student performance in academics. The work describes the mining of higher education students’ related attribute...
Efficient and Secure Information Sharing For Security Personnels: A Role and Cooperation Based Approach
To facilitate users to interact with and share information without difficulty and faultlessly across various networks and databases nationwide, a secure and trusted information-sharing nvironment has been recognized as...
Literature Review on Patient Scheduling Techniques
Patients need to undergo several checkups, tests, surgery and treatments according to their illness. This paper describes the challenges of patient scheduling and patient scheduling techniques. An efficient scheduling te...
Trust Based Load Distribution in a Data Grid Environment
The basic idea of a load balancing system is to transfer partial of system workload from busy nodes to some idle nodes. The target resource selection for task migration is a key factor in the load balance strategy. As gr...