Encryption using XOR based Extended Key for Information Security – A Novel Approach

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 1

Abstract

The explosive growth of information, places a high demand for Information Security. Information Security deals with securing the information from unauthorized access or misuse of information either intentionally or accidentally. Information may be represented in many forms like text, documents, audio, video, images or maps. The standard and widely used form is documents. The objective of our work is to secure information present in these documents especially in a shared environment like peer-to- peer environment. We have proposed a novel symmetric encryption method which uses XOR based extended key to encrypt all characters which includes alphabets, numerals and special characters. Our approach differs from traditional approaches which rely on numeric key values. [6], [1]. Our intention is to strengthen the confusion which inherently makes the decryption a challenging task.

Authors and Affiliations

E. Anupriya , Sachin Soni , Amit Agnihotri , Sourabh Babelay

Keywords

Related Articles

Adaptation of Optimal Methods In Resource Utilization, Job Scheduling In Grids

A Optimal Grid should have Three characterstics : It should not allow resource providers to increase prices continuously, No provider should reject to provide resources to certain type of jobs due to risk associated in e...

A Secure Scheme for Aggregating Encrypted Data Against Outsider Attacks in Wireless Sensor Networks

Wireless sensor networks are low powered energy operated sensors mainly deployed in remote environments. Using methods to save energy is of utmost importance in these systems. Data transmission in such networks is by far...

Symmetric-key Inter-domain end-to-end Authentication Protocols for Mobile System

Our goal is to propose and design a symmetric-key interdomain end-to-end authentication protocols for a mobile system. We will be considering three mobile service domains; each has an authentication server. We denote by...

Abnormal Gait Recognition

Due to increasing crime rate identification using biometrics has become an important field of research. When it is not possible to take snapshot, to read iris, to take finger prints etc then identification using gait may...

A QOS AWARE QUANTITATIVE WEB SERVICE SELECTION MODEL

Web service is a core technology for sharing information resources and integrating processes in companies or organizations. As the number of applications connected by Web service is increased, the importance of Web servi...

Download PDF file
  • EP ID EP145004
  • DOI -
  • Views 92
  • Downloads 0

How To Cite

E. Anupriya, Sachin Soni, Amit Agnihotri, Sourabh Babelay (2011). Encryption using XOR based Extended Key for Information Security – A Novel Approach. International Journal on Computer Science and Engineering, 3(1), 146-154. https://europub.co.uk/articles/-A-145004