Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 7
Abstract
Commonly in encryption or decryption process some of the characters are inter changed by using some encryption and decryption algorithms (like DES, IDEA) with key. But in Bit Shifting and Stuffing (BSS) system to represent a printable character it needs only seven bits as per its ASCII value. In computer system to represent a printable character it requires one byte, i.e. 8 bits. So a printable character occupies 7 bits and the last bit value is 0 which is not useful for the character. In BSS method we are stuffing a new bit in the place of unused bit which is shifting from another printable character. So in this BSS methodology after encryption, for every eight bytes of plain text it will generate seven bytes cipher text and in decryption, for every seven bytes of cipher text it will reproduce eight bytes of plain text.
Authors and Affiliations
B. Ravi Kumar , Dr. P. R. K. Murti
Facets of Software Component Repository
The software repository is used for storing, managing, and retrieving large numbers of software components. Repositories should be designed to meet the growing and changing needs of the software development organizations...
A Genetic Algorithm Optimized Decision Tree- SVM based Stock Market Trend Prediction System
Prediction of stock market trends has been an area of great interest both to researchers attempting to uncover the information hidden in the stock market data and for those who wish to profit by trading stocks. The extre...
Exploring a Hybrid of Geospatial Semantic Information in Ubiquitous Computing Environments
Nowadays, geospatial information plays a critical role. Searching and obtaining geospatial information, however, is a difficult and time-consuming task. The Semantic Web promises to facilitate this by improving the capab...
Common Framework For Unix Scripting Languages
With the thousands of commands available for the command line user to write own application based on some complex shell script or other script. The complexity implies more difficulties to make an efficient monitoring, ma...
Solution for Vehicles Noise Cancellation With Modification of LMS Adaptive Algorithm
The problems of noise cancelling systems are based on the specific characteristics of their sources. Therefore, the knowledge of each noise source should be represented prior to the excecution of the designed noise cance...