Indian Journal of Science and Technology
DOI: 10.17485/ijst/2015/v8i35/86648
Year: 2015, Volume: 8, Issue: 35, Pages: 1-5
Original Article
M. Lavanya1* , G. Aishwarya2 , S. Keerthana2 , V. Vaithiyanathan1 and S. Saravanan1
1 School of Computing, SASTRA University, Thanjavur - 613401, Tamil Nadu, India; [email protected], [email protected], [email protected]
2 Information and Communication Technology, SASTRA University, Thanjavur - 613401, Tamil Nadu, India; [email protected], [email protected]
This article aims to bring a novel method in cipher algorithm for secure aware communication. This paper proposes a unique scheme and ensures higher security during encryption and decryption process. The Key (ki) is generated for every Plain text pi. Plain text and key are converted to their equivalent ASCII values, by which the scrambled Cipher text (ci) is generated by implementing some of the concepts of the substitution techniques. During Decryption, the corresponding (ki) are used to recover the Plain text pi. It makes sure the need to send the full length key along with the cipher text for decryption process. The suggested method assures the greater security during transmission. There is a practical hindrance in guessing the Number of rounds (N) and the number of bits n shifted, by Cryptanalyst. This method will be more suitable for analyzing the discover key (ki) values from attempting Brute Force technique.
Keywords: Ciper Algorithms, Cryptanalyst, Decryption, Encryption, Secure Communication
Subscribe now for latest articles and news.