Indian Journal of Science and Technology
DOI: 10.17485/ijst/2017/v10i36/119181
Year: 2017, Volume: 10, Issue: 36, Pages: 1-6
Original Article
Dur-E-Shawar Agha1*, Sadiq Ali Khan2 , Huzefa Fakhruddin3 and Huma Hasan Rizvi1
1Department of Computer Engineering, Sir Syed University of Engineering and Technology, Karachi, Pakistan; [email protected], [email protected] 2Department of Computer Science, University of Karachi, Pakistan; [email protected] 3Trafix LLC, Karachi, Pakistan; [email protected]
*Author for correspondence
Dur-E-Shawar Agha
Department of Computer Engineering, Sir Syed University of Engineering and Technology, Karachi, Pakistan; [email protected]
Exchanging the secret information between organizations or in a corporate sector is a today’s world necessity. But the risk in such secret conversation has increased day by day. Hackers from all over the world trying to get the information of many places, due to this the transfer of knowledge is getting more complex in recent days. Encryption is the process in which scramble data has to be sent so that only authorized recipient can access it. Cryptographic system will be protected through the strong algorithm that can encrypt and decrypt the data in such a way that to make unreadable for external or unauthorized person. Different encryption algorithms are designed to secure the data by using different techniques and methodologies. This study is designing a symmetric key algorithm for both encryption and decryption procedure. Proposed algorithm applying ASCII codes together with the substitution method and the merging of XOR operation to enhance the process more secure. Experimental results will show the efficiency of the proposed technique for encryption and decryption.
Keywords: ASCII Values, Cipher Text, Cryptography, Decryption, Encryption, Plain Text, ROT13, XOR Operation
Subscribe now for latest articles and news.