A B C D E F G H I J K L M N O P Q R S T U V W X Y Z **All**

### Paul, Pranam

- Block based Data Encryption and Decryption using Number System Logic

#### Authors

#### Source

Networking and Communication Engineering, Vol 7, No 5 (2015), Pagination: 175-180#### Abstract

Cryptography is the automated (or algorithmic) method in which security goals are accomplished. Typically, when we say “crypto algorithm” we are discussing an algorithm meant to be executed on a computer. These algorithms operate on messages in the form of groups of bits.

Here we introduced a Block based symmetric key encryption algorithm, which is based on simple mathematical operation. In this algorithm encryption is done on binary file so it can be applicable for any type of data such a text as well as multimedia data [3]-[9]. For encryption a key is to be generated. Key length and bit stream is chosen at random. At first, the plain text has been converted into its binary form and then the binary file is divided into some blocks. The block length is our key and it’s choosing randomly.

Our algorithm is based on the following method:--

If the sum of each digit of a number is subtracted from that number, then the result is obviously divisible by a particular number [5]-[8]. This is the foundation of our algorithm.

#### Keywords

Cipher Text, Cryptography, Decryption, Encryption, Plain Text, Symmetric Key.- Cryptographic Algorithm Based on Triangular Form

#### Authors

#### Source

Networking and Communication Engineering, Vol 7, No 5 (2015), Pagination: 181-185#### Abstract

Cryptography is the automated (or algorithmic) method in which security goals are accomplished. Typically, when we say “cryptographic algorithm” we are discussing an algorithm meant to be executed on a computer [6]-[9].These algorithms operate the messages in the form of groups of bits.

Here we introduced a Block based symmetric key encryption and decryption algorithm [5]-[11].

The idea is developed on the basis to remember Pauli’s exclusion principle.

That is we know the number of orbit came as: 1s 2s2p 3s 3p 3d 4f 4p 4d 4s

But the electron enter to the orbit in the Following manner:

1s 2s2p 3s 3p 4f 3d 4p 4d 4s

That is the trick of our algorithm and our Key can be choose any random number, which defines the number of row of that Triangle.

#### Keywords

Cipher Text, Cryptography, Encryption, Decryption, Plain Text, Symmetric Key.- An Approach to Block Ciphering Using Root of Perfect Square Number

#### Authors

#### Source

Networking and Communication Engineering, Vol 7, No 5 (2015), Pagination: 186-192#### Abstract

In recent days, for secure information transmission through internet, Cryptography is used. Here for secure data communication the plain text would be encrypted into cipher text using encryption process. This encrypted text along with the key or information would be send by the sender at receiver’s end. Then using the key or information, the receiver would able to decrypt the encrypted text. Using this base idea there exist different algorithm for encryption and decryption and for key generation. Here the main concept of the algorithm comes from cryptography, to secure any kind of file as it is implemented on bit-level. The strength of the technique is analyzed in this paper. This is a block based private key cryptographic technique. Here the main idea is developed on the basis of finding the number which appears maximum time and replace all the numbers with another numbers with the help of suitable technique which is described in the algorithm section. Then there also exist another technique which is based on finding ischolar_main of the closest smaller perfect square. It can be possible that after encryption the encrypted file size can be reduced compared to the original file size. In case of encrypted file size reduced, lossless compression added extra flavour to it. The encryption and decryption process is clearly described in the algorithm section.

#### Keywords

Cryptography, Encryption, Decryption, Cipher, Private Key, Symmetric Key, Plain Text, Network Security.- Block based Cryptographic Protocol using Sequence of Rearrangement of Points

#### Authors

#### Source

Networking and Communication Engineering, Vol 7, No 3 (2015), Pagination: 95-98#### Abstract

In any kind of communication, security is the most important thing in today’s world. Bulk of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation [1]-[3].

This present work focus is enlightening the technique to secure data or message with authenticity and integrity [4]-[6]. With the growth of internet and network, the need for secure data transmission become more and more essential and important, as security is a major concern in the internet world. Data likely to be kept hide from all people except from the authorized user cannot be sent in plain text [7]-[8]. So the plain text should be codified by the process of encryption.

Every single type of data has its own features; therefore several kinds of techniques should be used to protect confidential data from unauthorized access. Here we are introducing a new algorithm which is based on simple graph operation. In this algorithm encryption is done on binary file so it can be applicable for any type of data such a text as well as multimedia data. Here the idea of cryptography is using key, conversion of plain text into cipher text called encryption and the reverse, means cipher text to plain text called decryption [9]-[12].

#### Keywords

Cryptography, Cipher Text Decryption, Encryption, Plain Text, Symmetric Key.- Implementing the Information Security using Factors of Number

#### Authors

#### Source

Networking and Communication Engineering, Vol 7, No 3 (2015), Pagination: 99-102#### Abstract

In any communication, security is the most important issue in today’s world. Lots of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research [8]. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present work focus is enlightening the technique to secure data or message with authenticity and integrity. With the growth of internet and network, the need for secure data transmission become more and more essential and important, as security is a major concern in the internet world [15]. Data likely to be kept hide from all people except from the authorized user cannot be sent in plain text. So the plain text should be codified by the process of encryption [1]-[4].

Each type of data has its own features; therefore different techniques should be used to protect confidential data from unauthorized access [11]. Here we introduced a new algorithm which is based on simple number system mathematical operation. In this algorithm encryption is done on binary file so it can be applicable for any type of data such a text as well as multimedia data [1]-[9]. Here the same idea of cryptography is working (i.e. using key, conversion of plaintext into cipher text called encryption and the reverse, means cipher text to plain text called decryption) [3]-[6].

#### Keywords

Cryptography, Encryption, Decryption, Plain Text, Cipher Text, Symmetric Key.- Block Based Data Encryption and Decryption Using the Distance between Prime Numbers

#### Authors

**Affiliations**

1 Narula Institute of Technology, Agarpara, Kolkata-109, West Bengal, IN

2 Department of Computer Application, Narula Institute of Technology, Agarpara, Kolkata-109, West Bengal, IN

#### Source

Networking and Communication Engineering, Vol 7, No 5 (2015), Pagination: 193-199#### Abstract

In any communication, security is the most important issue in today’s world. Lots of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present work focus is enlightening the technique to secure data or message with authenticity and integrity. With the growth of internet and network, the need for secure data transmission become more and more essential and important, as security is a major concern in the internet world [5]-[14]. Data likely to be kept hide from all people except from the authorized user cannot be sent in plain text. So the plain text should be codified by the process of encryption.

Each type of data has its own features; therefore different techniques should be used to protect confidential data from unauthorized access. Here we introduced a new algorithm which is based on simple mathematical operation [6]-[11]-[12]. In this algorithm encryption is done on binary file so it can be applicable for any type of data such a text as well as multimedia data. Here the same idea of cryptography is working (i.e. using key, conversion of plain text into cipher text called encryption and the Reverse, means cipher text to plain text called decryption) [1]-[3].

#### Keywords

Cryptography, Cipher Text, Decryption, Encryption, Plain Text, Symmetric Key.- Block Cipher Encryption based on Random Substitution

#### Authors

**Affiliations**

1 Narula Institute of Technology (NIT), Agarparahad, IN

2 Department of CA, Narula Institute of Technology (NIT), Agarparahad, IN

#### Source

Networking and Communication Engineering, Vol 7, No 5 (2015), Pagination: 200-205#### Abstract

Securing data is essential, whether it is in commercial or armature environment. Exchanging data over the network is risky due to illegitimate access and possible modification during communication. Certain attacks on data/message may take place. To minimize these problems, there are several techniques has been invented.

To secure data, primarily some cryptic techniques are used. In ancient times different types of substitution techniques were used, later on some mathematical models [2] [6] were devised to encrypt and decrypt the data. In present days both of those techniques are combined to achieve solutions associated with those problems. In our work we have used the combined technique. We have used substitutions to make the data random, to enable this task we have used the values comprises the keys then performed XOR operations using modified data (after substitution) and keys. The whole process is capable to encrypt and decrypt a file.

#### Keywords

Secure, Data, Network, Risk, Attacks, Cryptic, Substitution, Encrypt, Decrypt, Mathematical Models.- Block based Data Encryption and Decryption using Algorithmic Operations

#### Authors

**Affiliations**

1 Narula Institute of Technology under WBUT, IN

2 CA Department, Narula Institute of Technology (NIT), Agarpara, IN

#### Source

Networking and Communication Engineering, Vol 7, No 2 (2015), Pagination: 69-73#### Abstract

In any communication, security is the most important issue in today’s world. Lots of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation [1]-[7].

This present work focus is enlightening the technique to secure data or message with authenticity and integrity. With the growth of internet and network, the need for secure data transmission become more and more essential and important, as security is a major concern in the internet world [2]-[4]. Data likely to be kept hide from all people except from the authorized user cannot be sent in plain text. So the plain text should be codified by the process of encryption.

Each type of data has its own features; therefore different techniques should be used to protect confidential data from unauthorized access. Here we introduced a new algorithm which is based on simple mathematical operation. In this algorithm encryption is done on binary file so it can be applicable for any type of data such a text as well as multimedia data [3]-[9]. Here the same idea of cryptography is working (i.e. using key, conversion of plain text into cipher text called encryption and the reverse, means cipher text to plain text called decryption).

#### Keywords

Cipher Text, Cryptography, Encryption, Decryption, Plain Text, Symmetric Key.- Implementing the Information Security Using Number System

#### Authors

**Affiliations**

1 Narula Institue of Technology under WBUT, IN

2 Departmental Head, CA Department, Narula Institute of Technology (NIT), Agarpara, IN

#### Source

Networking and Communication Engineering, Vol 7, No 2 (2015), Pagination: 74-78#### Abstract

In any communication, security is the most important issue in today’s world. Lots of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present work focus is enlightening the technique to secure data or message with authenticity and integrity. With the growth of internet and network, the need for secure data transmission become more and more essential and important, as security is a major concern in the internet world [15]. Data likely to be kept hide from all people except from the authorized user cannot be sent in plain text. So the plain text should be codified by the process of encryption [1]-[4].

Each type of data has its own features; therefore different techniques should be used to protect confidential data from unauthorized access. Here we introduced a new algorithm which is based on simple number system mathematical operation. In this algorithm encryption is done on binary file so it can be applicable for any type of data such a text as well as multimedia data [1]-[9]. Here the same idea of cryptography is working (i.e. using key, conversion of plaintext into cipher text called encryption and the reverse, means cipher text to plain text called decryption)[3]-[6].

#### Keywords

Cryptography, Encryption, Decryption, Plain Text, Cipher Text, Symmetric Key.- Block based Cryptographic Protocol with Arithmetic Operations

#### Authors

#### Source

Networking and Communication Engineering, Vol 7, No 5 (2015), Pagination: 212-215#### Abstract

In todays world for any kind of communication, security is the most important thing. There are huge number of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research.

This present work focus in technique to secure data or message with authenticity. With the growth of worldwide communicational network and internet, the necessity for secure data transfer become more and more essential and important, as security of data is a major concern in todays internet world. Data must be kept in hidden form from the unauthorised user or any kind of hacker attack, so we need to make our data safe and secure by implementing more secure encryption technique.

Every kind of data has its own characteristics, so we need different kind of encryption techniques to make secure our data. In this algorithm we are introducing a new kind of techniques using simple arithmetics operations.