Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Block based Cryptographic Protocol using Sequence of Rearrangement of Points


     

   Subscribe/Renew Journal


In any kind of communication, security is the most important thing in today’s world. Bulk of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation [1]-[3].

This present work focus is enlightening the technique to secure data or message with authenticity and integrity [4]-[6]. With the growth of internet and network, the need for secure data transmission become more and more essential and important, as security is a major concern in the internet world. Data likely to be kept hide from all people except from the authorized user cannot be sent in plain text [7]-[8]. So the plain text should be codified by the process of encryption.

Every single type of data has its own features; therefore several kinds of techniques should be used to protect confidential data from unauthorized access. Here we are introducing a new algorithm which is based on simple graph operation. In this algorithm encryption is done on binary file so it can be applicable for any type of data such a text as well as multimedia data. Here the  idea of cryptography is  using key, conversion of plain text into cipher text called encryption and the reverse, means cipher text to plain text called decryption [9]-[12].


Keywords

Cryptography, Cipher Text Decryption, Encryption, Plain Text, Symmetric Key.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 173

PDF Views: 3




  • Block based Cryptographic Protocol using Sequence of Rearrangement of Points

Abstract Views: 173  |  PDF Views: 3

Authors

Abstract


In any kind of communication, security is the most important thing in today’s world. Bulk of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation [1]-[3].

This present work focus is enlightening the technique to secure data or message with authenticity and integrity [4]-[6]. With the growth of internet and network, the need for secure data transmission become more and more essential and important, as security is a major concern in the internet world. Data likely to be kept hide from all people except from the authorized user cannot be sent in plain text [7]-[8]. So the plain text should be codified by the process of encryption.

Every single type of data has its own features; therefore several kinds of techniques should be used to protect confidential data from unauthorized access. Here we are introducing a new algorithm which is based on simple graph operation. In this algorithm encryption is done on binary file so it can be applicable for any type of data such a text as well as multimedia data. Here the  idea of cryptography is  using key, conversion of plain text into cipher text called encryption and the reverse, means cipher text to plain text called decryption [9]-[12].


Keywords


Cryptography, Cipher Text Decryption, Encryption, Plain Text, Symmetric Key.