Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Implementing the Information Security Using Number System


Affiliations
1 Narula Institue of Technology under WBUT, India
2 Departmental Head, CA Department, Narula Institute of Technology (NIT), Agarpara, India
     

   Subscribe/Renew Journal


In any communication, security is the most important issue in today’s world. Lots of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present work focus is enlightening the technique to secure data or message with authenticity and integrity. With the growth of internet and network, the need for secure data transmission become more and more essential and important, as security is a major concern in the internet world [15]. Data likely to be kept hide from all people except from the authorized user cannot be sent in plain text. So the plain text should be codified by the process of encryption [1]-[4].

Each type of data has its own features; therefore different techniques should be used to protect confidential data from unauthorized access. Here we introduced a new algorithm which is based on simple number system mathematical operation. In this algorithm encryption is done on binary file so it can be applicable for any type of data such a text as well as multimedia data [1]-[9]. Here the same idea of cryptography is working (i.e. using key, conversion of plaintext into cipher text called encryption and the reverse, means cipher text to plain text called decryption)[3]-[6].


Keywords

Cryptography, Encryption, Decryption, Plain Text, Cipher Text, Symmetric Key.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 246

PDF Views: 3




  • Implementing the Information Security Using Number System

Abstract Views: 246  |  PDF Views: 3

Authors

Moinak Chowdhury
Narula Institue of Technology under WBUT, India
Pranam Paul
Departmental Head, CA Department, Narula Institute of Technology (NIT), Agarpara, India

Abstract


In any communication, security is the most important issue in today’s world. Lots of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present work focus is enlightening the technique to secure data or message with authenticity and integrity. With the growth of internet and network, the need for secure data transmission become more and more essential and important, as security is a major concern in the internet world [15]. Data likely to be kept hide from all people except from the authorized user cannot be sent in plain text. So the plain text should be codified by the process of encryption [1]-[4].

Each type of data has its own features; therefore different techniques should be used to protect confidential data from unauthorized access. Here we introduced a new algorithm which is based on simple number system mathematical operation. In this algorithm encryption is done on binary file so it can be applicable for any type of data such a text as well as multimedia data [1]-[9]. Here the same idea of cryptography is working (i.e. using key, conversion of plaintext into cipher text called encryption and the reverse, means cipher text to plain text called decryption)[3]-[6].


Keywords


Cryptography, Encryption, Decryption, Plain Text, Cipher Text, Symmetric Key.