Encryption using XOR based Extended Key for Information Security – A Novel Approach

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 1

Abstract

The explosive growth of information, places a high demand for Information Security. Information Security deals with securing the information from unauthorized access or misuse of information either intentionally or accidentally. Information may be represented in many forms like text, documents, audio, video, images or maps. The standard and widely used form is documents. The objective of our work is to secure information present in these documents especially in a shared environment like peer-to- peer environment. We have proposed a novel symmetric encryption method which uses XOR based extended key to encrypt all characters which includes alphabets, numerals and special characters. Our approach differs from traditional approaches which rely on numeric key values. [6], [1]. Our intention is to strengthen the confusion which inherently makes the decryption a challenging task.

Authors and Affiliations

E. Anupriya , Sachin Soni , Amit Agnihotri , Sourabh Babelay

Keywords

Related Articles

PARALLELS BETWEEN GLUCONEOGENESIS AND SYNCHRONOUS MACHINES

Biological diversity particularly at molecular level is astounding and can be used for rational manipulation of biological organisms. To analyze molecular diversity in its full scope computational models of biological or...

Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in which participating nodes hav...

Educational Approach of Refactoring in Facilitating Reverse Engineering

Refactoring improves software codes and design. This activity often neglected by software developers because they need time to decide tactically where and when to refactor codes. Although the concepts theoretically insti...

Performance Evaluation of Modified Signcryption Scheme

Before a message is sent out, the sender of the message would sign it using a digital signature scheme and then encrypt the message (and the signature) use a private key encryption algorithm under a randomly chosen messa...

A Framework For Extracting Information From Web Using VTD-XML‘s XPath

The exponential growth of WWW (World Wide Web) is the cause for vast pool of information as well as several challenges posed by it, such as extracting potentially useful and unknown information from WWW. Many websites ar...

Download PDF file
  • EP ID EP145004
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

E. Anupriya, Sachin Soni, Amit Agnihotri, Sourabh Babelay (2011). Encryption using XOR based Extended Key for Information Security – A Novel Approach. International Journal on Computer Science and Engineering, 3(1), 146-154. https://europub.co.uk/articles/-A-145004