Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Cryptographic Algorithm Based on Triangular Form


     

   Subscribe/Renew Journal


Cryptography is the automated (or algorithmic) method in which security goals are accomplished. Typically, when we say “cryptographic algorithm” we are discussing an algorithm meant to be executed on a computer [6]-[9].These algorithms operate the messages in the form of groups of bits.

Here we introduced a Block based symmetric key encryption and decryption algorithm [5]-[11].

The idea is developed on the basis to remember Pauli’s exclusion principle.

That is we know the number of orbit came as: 1s 2s2p 3s 3p 3d 4f 4p 4d 4s

But the electron enter to the orbit in the Following manner:

1s 2s2p 3s 3p 4f 3d 4p 4d 4s

 

That is the trick of our algorithm and our Key can be choose any random number, which defines the number of row of that Triangle.


Keywords

Cipher Text, Cryptography, Encryption, Decryption, Plain Text, Symmetric Key.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 225

PDF Views: 1




  • Cryptographic Algorithm Based on Triangular Form

Abstract Views: 225  |  PDF Views: 1

Authors

Abstract


Cryptography is the automated (or algorithmic) method in which security goals are accomplished. Typically, when we say “cryptographic algorithm” we are discussing an algorithm meant to be executed on a computer [6]-[9].These algorithms operate the messages in the form of groups of bits.

Here we introduced a Block based symmetric key encryption and decryption algorithm [5]-[11].

The idea is developed on the basis to remember Pauli’s exclusion principle.

That is we know the number of orbit came as: 1s 2s2p 3s 3p 3d 4f 4p 4d 4s

But the electron enter to the orbit in the Following manner:

1s 2s2p 3s 3p 4f 3d 4p 4d 4s

 

That is the trick of our algorithm and our Key can be choose any random number, which defines the number of row of that Triangle.


Keywords


Cipher Text, Cryptography, Encryption, Decryption, Plain Text, Symmetric Key.