Open Access Open Access  Restricted Access Subscription Access

Security Enhancing by using ASCII Values and Substitution Technique for Symmetric Key Cryptography


Affiliations
1 Department of Computer Engineering, Sir Syed University of Engineering and Technology, Karachi, Pakistan
2 Department of Computer Science, University of Karachi, Pakistan
3 Trafix LLC, Karachi, Pakistan
 

Exchanging the secret information between organizations or in a corporate sector is a today’s world necessity. But the risk in such secret conversation has increased day by day. Hackers from all over the world trying to get the information of many places, due to this the transfer of knowledge is getting more complex in recent days. Encryption is the process in which scramble data has to be sent so that only authorized recipient can access it. Cryptographic system will be protected through the strong algorithm that can encrypt and decrypt the data in such a way that to make unreadable for external or unauthorized person. Different encryption algorithms are designed to secure the data by using different techniques and methodologies. This study is designing a symmetric key algorithm for both encryption and decryption procedure. Proposed algorithm applying ASCII codes together with the substitution method and the merging of XOR operation to enhance the process more secure. Experimental results will show the efficiency of the proposed technique for encryption and decryption.

Keywords

ASCII Values, Cipher Text, Cryptography, Decryption, Encryption, Plain Text, ROT13, XOR Operation
User

Abstract Views: 228

PDF Views: 0




  • Security Enhancing by using ASCII Values and Substitution Technique for Symmetric Key Cryptography

Abstract Views: 228  |  PDF Views: 0

Authors

Dur-E-Shawar Agha
Department of Computer Engineering, Sir Syed University of Engineering and Technology, Karachi, Pakistan
Sadiq Ali Khan
Department of Computer Science, University of Karachi, Pakistan
Huzefa Fakhruddin
Trafix LLC, Karachi, Pakistan
Huma Hasan Rizvi
Department of Computer Engineering, Sir Syed University of Engineering and Technology, Karachi, Pakistan

Abstract


Exchanging the secret information between organizations or in a corporate sector is a today’s world necessity. But the risk in such secret conversation has increased day by day. Hackers from all over the world trying to get the information of many places, due to this the transfer of knowledge is getting more complex in recent days. Encryption is the process in which scramble data has to be sent so that only authorized recipient can access it. Cryptographic system will be protected through the strong algorithm that can encrypt and decrypt the data in such a way that to make unreadable for external or unauthorized person. Different encryption algorithms are designed to secure the data by using different techniques and methodologies. This study is designing a symmetric key algorithm for both encryption and decryption procedure. Proposed algorithm applying ASCII codes together with the substitution method and the merging of XOR operation to enhance the process more secure. Experimental results will show the efficiency of the proposed technique for encryption and decryption.

Keywords


ASCII Values, Cipher Text, Cryptography, Decryption, Encryption, Plain Text, ROT13, XOR Operation



DOI: https://doi.org/10.17485/ijst%2F2017%2Fv10i36%2F167966