Bitwise Operations Based Encryption and Decryption

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 1

Abstract

In this paper, variable block length based character/bit level ransformation has been proposed for encryption and cryption, where a block of characters /few bits has taken into account. he originated text is transformed into decimal values and assed to encoder module. In this module values are cluttered sing binary operations present in most systems with keys. This routine is based on feistel iteration using large umber of rounds for security justification to certain intensity and passed to the security module. This module performs conversion of values into octal base values and then padded ith a vector. When compared with other encryption schemes it provides more security even though keys are revealed. Since, one parameter namely vector ai alone been kept secret. The receiver passes the received cipher text to security module and yields the cipher decimal values. These values are transformed into a form of originated text.

Authors and Affiliations

K. Naveen Kumar , K. T. Praveen kumar , G. V. S. Raj Kumar , P. Chandra Sekhar

Keywords

Related Articles

AN APPROACH ORIENTED TOWARDS ENHANCING A METRIC PERFORMANCE

Software Engineering like all other engineering professions has metrics and Software metrics are increasingly playing a central role in the planning and control of software development projects [2]. A software metric is...

DENSITY DETERMINATION IN MOBILE NETWORK USING CLUSTERING CLASSIFICATION

The quality service in the mobile network is achievable via expanding or sharing the existing mobile infrastructure. The expandability or share ability of the mobile network is to be determined through some valuable meas...

Correlating Dimensions of Inheritance Hierarchy with Complexity & Reuse

Inheritance is the vital feature of any object oriented software which provides reuse of exiting classes for designing new classes. Higher reuse provides higher productivity and greater quality. Inheritance hierarchy is...

Facets of Software Component Repository

The software repository is used for storing, managing, and retrieving large numbers of software components. Repositories should be designed to meet the growing and changing needs of the software development organizations...

Agents- based Methodology for Wireless Sensor Networks

Nowadays, agents-based systems are widely used to solve many engineering problems. The characteristics of the agents-based approach enable them to be used for the wireless sensor networks (WSNs) successfully. The propose...

Download PDF file
  • EP ID EP139754
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

K. Naveen Kumar, K. T. Praveen kumar, G. V. S. Raj Kumar, P. Chandra Sekhar (2011). Bitwise Operations Based Encryption and Decryption. International Journal on Computer Science and Engineering, 3(1), 50-54. https://europub.co.uk/articles/-A-139754