Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Abstract
Encryption is the process of the transforming plaintext Fig.1 Encryption Process
into the ciphertext where the plaintext is the input to these
encryption process and ciphertext is the output of the encryption Decryptions are the process to transforms or converting the
process. Decryption is the process of transforming ciphertext into encoded data into some meaningfuls.It can also be said that
the plaintext where ciphertext are the input to the decryption decryption is the process of transforming ciphertext into the
process and plaintext is the output of the decryption process. plaintext where ciphertext is the input to the decryption process
Therese are various encryption algorithms exists classified as
and plaintext is the output of the decryption process.
symmetric and asymmetrics encryption algorithms. Here, I
present an algorithm for data encryption and decryption which is
based on the ASCII values of characters in the plaintext. That Key
algorithm are used to encrypt data by using ASCII values of the Encoded Decryption Original Data
data to be encrypted. The secrets used will be modifying o Data Or
Process
another string and that string is used as a key to encrypt or Or Plaintext
decrypt the data. So, it can be said that its is a kind of symmetric Ciphertext
encryption algorithm because it uses same key for encryption
and decryption but by slightly modifying it. This algorithm
operates when the length of input and the length of key are same.
I. INTRODUCTION
Cryptography is the art and science of study of
designing or make the secret message i.e. code or ciphers of
the originals message for the secures communications
between sender and the receiver. The main goals of
cryptography are Authentication, Privacy, Integrity, Non-
repudiation and Access Control. Encryptions are basically a
process or algorithm to make information hidden or secret. It
is considered as the subset of cryptography. It is the actual
process of applying cryptography. It is the process to
transform or converting the data into some another form that
appears to be random, meaningless and unintelligible. It can Secret Key
also be said that encryption is the process of transforming
plaintext into the ciphertext where plaintext is the input to the
Fig.2 Decryption Process
encryption process and ciphertext is the output of the
encryption process.
A cryptographic algorithm is a mathematical functions and
unchanging set of steps to perform encryption anddecryption of the
original data possible to decrypt the generated ciphertext without
Origina Encoded using the key. If a really good cryptographic algorithm is used,
l Data Encryption Data then there is no technique significantly better than methodically
Or Process Or trying every possible combination of key
Plainte Ciphertex I. Encryption Algorithm:
xt t Encryption Algorithm are categorized into two categories as
follows:-
a) Symmetric Key Encryption
1
Registration number: 16mtcsnt11__ Subject Code CST-6201
2
Registration number: 16mtcsnt11__ Subject Code CST-6201
Then P=7,Q=11
Then calculate,N=P*Q,N=77
Cryptography D*13mod=1
D=37
C.T=(5)^13mod77=26 the also
P.T=(26)^37mod77
II. Block cipher:
Asymmetric Symmetric Processing or encoding of a plaintext is done as a fixed length block
Encryption Encryption one by one.A block for example could 64,128 bit in size.A same key
is used to encrypts each of the block.more secures in most cases.kook
more likes an extremely large substitution.Usually more complex and
slowers in operation.
RSA
n-bit plaintext n-bit Plaintext
DES
RC4
Blowfish
KnK2,K1 Kn.K2,
K1
Cn.C2C1
Encryption Decryption
VI. ACKNOWLEDGMENT
The satisfaction and euphoria that accompany the successful
completion of any task would be incomplete without
mentioning the names of people who made it possible, whose
4
Registration number: 16mtcsnt11__ Subject Code CST-6201
VII. REFERENCES
[1] Gurjeevan Singh, Ashwani Kumar Singla, K.S. Sandha, Throughput
Analysis of Various Encryption Algorithms, International
Journal of Computer Science and Technology, Vol. 2, Issue 3, Septemver
2011.
[2] Diaa Salama Abd Elminaam, Hatem Mohamed Abdual Kader, and
Mohiy Mohamed Hadhoud, Evaluating the Performance of
Symmetric Encryption Algorithms, International Journal of Network
Security, Vol.10, No.3, PP.216222, May 2010.
[3] Gary C. Kessler An Overview of Cryptography , May 1998
[4] Fauzan Saeed and Mustafa Rashid, Integrating Classical Encryption
with Modern Technique, IJCSNS, Vol. 10, no.5, May 2010
[5] M. H. Ibrahim, Receiver-deniable public-key encryption",
International Journal of Network Security, Vol. 8, no. 2, pp. 159-165,