Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Block based Data Encryption and Decryption using Algorithmic Operations


Affiliations
1 Narula Institute of Technology under WBUT, India
2 CA Department, Narula Institute of Technology (NIT), Agarpara, India
     

   Subscribe/Renew Journal


In any communication, security is the most important issue in today’s world. Lots of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation [1]-[7].

This present work focus is enlightening the technique to secure data or message with authenticity and integrity. With the growth of internet and network, the need for secure data transmission become more and more essential and important, as security is a major concern in the internet world [2]-[4]. Data likely to be kept hide from all people except from the authorized user cannot be sent in plain text. So the plain text should be codified by the process of encryption.

Each type of data has its own features; therefore different techniques should be used to protect confidential data from unauthorized access. Here we introduced a new algorithm which is based on simple mathematical operation. In this algorithm encryption is done on binary file so it can be applicable for any type of data such a text as well as multimedia data [3]-[9]. Here the same idea of cryptography is working (i.e. using key, conversion of plain text into cipher text called encryption and the reverse, means cipher text to plain text called decryption).


Keywords

Cipher Text, Cryptography, Encryption, Decryption, Plain Text, Symmetric Key.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 198

PDF Views: 2




  • Block based Data Encryption and Decryption using Algorithmic Operations

Abstract Views: 198  |  PDF Views: 2

Authors

Ayan Banerjee
Narula Institute of Technology under WBUT, India
Pranam Paul
CA Department, Narula Institute of Technology (NIT), Agarpara, India

Abstract


In any communication, security is the most important issue in today’s world. Lots of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation [1]-[7].

This present work focus is enlightening the technique to secure data or message with authenticity and integrity. With the growth of internet and network, the need for secure data transmission become more and more essential and important, as security is a major concern in the internet world [2]-[4]. Data likely to be kept hide from all people except from the authorized user cannot be sent in plain text. So the plain text should be codified by the process of encryption.

Each type of data has its own features; therefore different techniques should be used to protect confidential data from unauthorized access. Here we introduced a new algorithm which is based on simple mathematical operation. In this algorithm encryption is done on binary file so it can be applicable for any type of data such a text as well as multimedia data [3]-[9]. Here the same idea of cryptography is working (i.e. using key, conversion of plain text into cipher text called encryption and the reverse, means cipher text to plain text called decryption).


Keywords


Cipher Text, Cryptography, Encryption, Decryption, Plain Text, Symmetric Key.