UNICODE and Colors Integration tool for Encryption and Decryption
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
Cryptography, to most people, is concerned with keeping communications private. Indeed, the protection of sensitive communications has been the emphasis of cryptography throughout much of its history. Encryption is the transformation of data into some unreadable form. Its purpose is to ensure privacy by keeping the information hidden from anyone for whom it is not intended, even those who can see the encrypted data. Decryption is the reverse of encryption; it is the transformation of encrypted data back into some intelligible form. UNICODE is a computing industry standard for the consistent representation and handling of text expressed in most of the world's writing systems. Developed in conjunction with the Universal Character Set standard and published in book form as The UNICODE Standard, the latest version of UNICODE consists of a repertoire of more than 107,000 characters covering 90 scripts, a set of code charts for visual reference, an encoding methodology and set of standard character encodings, an enumeration of character properties such as upper and lower case, a set of reference data computer files, and a number of related items, such as character properties, rules for normalization, decomposition, collation, rendering, and bidirectional display order (for the correct display of text containing both rightto- left scripts, such as Arabic or Hebrew, and left-to-right scripts). This paper introduces a new technique for cryptography by using UNICODE and colors in universe (supported by computer).
Authors and Affiliations
Maram Balajee
A Secure Scheme for Aggregating Encrypted Data Against Outsider Attacks in Wireless Sensor Networks
Wireless sensor networks are low powered energy operated sensors mainly deployed in remote environments. Using methods to save energy is of utmost importance in these systems. Data transmission in such networks is by far...
Efficient Processing of XML Documents in Hadoop Map Reduce
XML has dominated the enterprise landscape for fifteen years and still remains the most commonly used data format. Despite its popularity the usage of XML for "Big Data" is challenging due to its semi-structured nature a...
A Scheduling Approach with Processor and Network Heterogeneity for Grid Environment
Processor heterogeneity is an important issue in grid environment. In this paper, a list based task scheduling algorithm, called “critical path scheduling with t-level” (CPST) for grid computing system is proposed. There...
NEW NUMERICAL ALGORITHMS FOR MINIMIZATION OF NONLINEAR FUNCTIONS
In this paper, we propose few new algorithms of third order onvergence for minimization of nonlinear functions which is based on geometric construction of iteration functions of order hree to develop cubically converge...
Implementation of Multiplatform RIA using User Interface Components
Abstract—Nowadays, there are a growing number of Web 1.0 applications that are migrating towards Web 2.0 User Interfaces, in search of multimedia support and higher levels of interaction among other features. These We...