[b]Secure Symmetric Key Algorithm [SSKA] For Information Exchange Using Modulo 67 [/b]

Abstract

 The e-data usage is increasing day by day. Nowadays exchange of data over the internet is increased higher than before. Security is the main issue in communication over a network. Protection must be given against attackers. Solutions for network security comes with concepts like cryptography in which distribution of keys have been done. Cryptography plays a vital role in providing security. There are two types of cryptography mechanism: Symmetric and Asymmetric Key. Symmetric Key use single key for encryption and decryption whereas Asymmetric Key uses two keys one for encryption another for decryption. The most commonly used algorithm is Symmetric Key algorithms. The power or strength of these algorithms is based on the difficulty to break the original messages. In this paper, new modulo 67 Symmetric Key algorithm method is proposed Three keys are used in which one is a user entered key which is converted into ASCII and binary then first key is produced and second natural number is entered by user which is used to find the inverse of modulo 67. Third key is generated just like second key generation method. The proposed algorithm is used for Encryption and Decryption.

Authors and Affiliations

Mr. H. Mohamed Ashik

Keywords

Related Articles

 Total Survey of Data Security Issues in Cloud Computing

 In today’s IT era cloud computing is the most preferable research topic. In cloud computing data storage, data transfer can be possible. So that, data security is the main aspect of cloud computing and also for an...

 CONFORMATIONAL COMPARISON BETWEEN PURE AND CHEMICALLY MODIFIED AGAROSE

 In this work, we conduct a statistical study to compare the molecular conformations of pure agarose and agarose chem-ically modified. . It is to follow the process of their gelation through calculation of the rate...

POWER OBLIGATION WITH FEMTOCELL FOR LTE NETWORKS

Femtocells are relied upon to build system limit, broaden full scale cell scope, and present new administrations. Since Femtocells offer the same recurrence band with full scale cells much of the time, the femtocell Bas...

 MODELING AND SIMULATION OF CNC LATHE AND ROBOT OF FLEXIBLE MANUFACTURING SYSTEM USING VIRTUAL REALITY MODELING LANGUAGE (VRML)

 The paper deals with the modeling and simulation of elements of Flexible manufacturing System (FMS) - CNC Lathe and Robot using Virtual Reality Modelling Language (VRML). The Elements CNC Lathe Machine and Robot,...

 SOME THEORETICAL ANALOGIES IN THE DESCRIPTION OF STRUCTURAL AND MECHANICAL PROPERTIES OF ABO3 TYPE PEROVSKITE MATERIAL

 The result obtained using Experimental approaches, Computer based Approaches, Physical Method approaches, Statistical Method approaches to investigate structural properties of ABO3 type perovskite oxides are widely...

Download PDF file
  • EP ID EP117236
  • DOI -
  • Views 73
  • Downloads 0

How To Cite

Mr. H. Mohamed Ashik (30).  [b]Secure Symmetric Key Algorithm [SSKA] For Information Exchange Using Modulo 67 [/b]. International Journal of Engineering Sciences & Research Technology, 3(2), 983-987. https://europub.co.uk/articles/-A-117236