Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Cryptography Using Xor Cipher


Affiliations
1 Govt. P G College Ambala, Cantt. - 133001, India
     

   Subscribe/Renew Journal


In the present work the author has introduced a new cryptographic method using XOR Cipher for data encryption and decryption of any data file at three stages (1) First, by converting each character into corresponding binary code using Extended ASCII Code thus we get 8N bits for input file containing of N characters (2) Secondly, creating a string of 0's and 1's such that total number of 0's and 1's is 8N, the consecutive numbers of 0's and 1's in this string may be from 1 to 7 (3) Thirdly, apply XOR operation on binary strings obtained at stages one and two and (4) Finally, converting binary string obtained at stage three into corresponding characters using reverse Extended ASCII Code. The results obtained after application of this algorithm are excellent.

Keywords

Encryption, Decryption, XOR Cipher.
Subscription Login to verify subscription
User
Notifications
Font Size


Abstract Views: 179

PDF Views: 1




  • Cryptography Using Xor Cipher

Abstract Views: 179  |  PDF Views: 1

Authors

Satish Kumar Garg
Govt. P G College Ambala, Cantt. - 133001, India

Abstract


In the present work the author has introduced a new cryptographic method using XOR Cipher for data encryption and decryption of any data file at three stages (1) First, by converting each character into corresponding binary code using Extended ASCII Code thus we get 8N bits for input file containing of N characters (2) Secondly, creating a string of 0's and 1's such that total number of 0's and 1's is 8N, the consecutive numbers of 0's and 1's in this string may be from 1 to 7 (3) Thirdly, apply XOR operation on binary strings obtained at stages one and two and (4) Finally, converting binary string obtained at stage three into corresponding characters using reverse Extended ASCII Code. The results obtained after application of this algorithm are excellent.

Keywords


Encryption, Decryption, XOR Cipher.