Open Access Open Access  Restricted Access Subscription Access

Nearest Prime Cipher for Data Confidentiality and Integrity


Affiliations
1 Dept of CSE, YSREC of YV University, Proddatur, India
2 YSREC of YV University, Proddatur, India
 

Communication is the process of transmitting information from source to destination. The information exchanged between sender and receiver through the proper channel. The information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information cryptography techniques are used. The key is playing prominent role in cryptography. This paper proposes a novel method for key generation by using nearest primes. Further 2's complement and logical operations are used in encryption and decryption process. The final cipher text is generated by representing the intermediate cipher in matrix form and then read by column wise.

Keywords

2’s Complement, Ciphertext, Cryptography, Nearest Prime Number, Plaintext, XOR Operation.
User
Notifications
Font Size

Abstract Views: 135

PDF Views: 5




  • Nearest Prime Cipher for Data Confidentiality and Integrity

Abstract Views: 135  |  PDF Views: 5

Authors

S. Kiran
Dept of CSE, YSREC of YV University, Proddatur, India
N. Subramanyan
Dept of CSE, YSREC of YV University, Proddatur, India
Y. Suma
YSREC of YV University, Proddatur, India
K. Haripriya
YSREC of YV University, Proddatur, India

Abstract


Communication is the process of transmitting information from source to destination. The information exchanged between sender and receiver through the proper channel. The information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information cryptography techniques are used. The key is playing prominent role in cryptography. This paper proposes a novel method for key generation by using nearest primes. Further 2's complement and logical operations are used in encryption and decryption process. The final cipher text is generated by representing the intermediate cipher in matrix form and then read by column wise.

Keywords


2’s Complement, Ciphertext, Cryptography, Nearest Prime Number, Plaintext, XOR Operation.