Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 7

Abstract

Commonly in encryption or decryption process some of the characters are inter changed by using some encryption and decryption algorithms (like DES, IDEA) with key. But in Bit Shifting and Stuffing (BSS) system to represent a printable character it needs only seven bits as per its ASCII value. In computer system to represent a printable character it requires one byte, i.e. 8 bits. So a printable character occupies 7 bits and the last bit value is 0 which is not useful for the character. In BSS method we are stuffing a new bit in the place of unused bit which is shifting from another printable character. So in this BSS methodology after encryption, for every eight bytes of plain text it will generate seven bytes cipher text and in decryption, for every seven bytes of cipher text it will reproduce eight bytes of plain text.

Authors and Affiliations

B. Ravi Kumar , Dr. P. R. K. Murti

Keywords

Related Articles

A Survey on Early Determination of Zero Quantized Coefficients in Video Coding

In video encoding, there are a large number of discrete cosine transform (DCT) coefficients of the prediction residue which are quantized to zeros. Therefore, it is desired to design a method which can early detect zero...

Study of Efficient Technique Based On 2D Tsallis Entropy For Image Thresholding

Thresholding is an important task in image processing. It is a main tool in pattern recognition, image segmentation, edge detection and scene analysis. In this paper, we present a new thresholding technique based on two-...

Direct Processor Access for Non Dedicated Server using Multi Core Processor

The objective of the paper is to design a co processor for a desktop machine which enables the machine to act as non dedicated server, such that the co processor will act as a server processor and the multi-core processo...

“An Improved Round Robin Scheduling Algorithm for CPU scheduling”

There are many functions which are provided by operating ystem like process management, memory management, file management, input/output management, networking, protection system and command interpreter ystem. In these...

Processor-Directed Cache Coherence Mechanism – A Performance Study

Cache coherent multiprocessor architecture is widely used in the recent multi-core systems, embedded systems and massively parallel processors. With the ever increasing performance gap between processor and memory, ther...

Download PDF file
  • EP ID EP155447
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

B. Ravi Kumar, Dr. P. R. K. Murti (2011). Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology. International Journal on Computer Science and Engineering, 3(7), 2818-2827. https://europub.co.uk/articles/-A-155447