Cryptographic Algorithm For Enhancing Data Security A Theoretical Approach IJERTV10IS030158
Cryptographic Algorithm For Enhancing Data Security A Theoretical Approach IJERTV10IS030158
net/publication/350386527
CITATIONS READS
0 547
3 authors:
Ankit Mishra
GLA University
9 PUBLICATIONS 22 CITATIONS
SEE PROFILE
All content following this page was uploaded by Tushar Kumar on 25 March 2021.
I. INTRODUCTION
The Greek meaning of Cryptography is Secret Writing. Data
Security is one of the major concerns in today's world.
Cryptography is a method to fulfill the confidentiality of
data. Cryptography provides the privacy of data for an
Fig. 2 Cryptography Characteristics
individual or organization by converting the original data to
a readable ununderstandable format for an unauthorized (B). TYPES OF CRYPTOGRAPHY
person and converting back to original data for the Cryptography is a method that is linked to convert plain text
authorized individual[1]. Cryptography Technique into cipher text i.e called encryption and convert back to
translates the plain text to another format, which is called plain text i.e know as decryption. Various type of encryption
cipher Text with an Encryption Key and can also Convert and decryption are available but the most commonly used
cipher text back to plain text with the same or different algorithms for cryptography are
encryption key based on the technique used to encrypt the (C). SYMMETRIC KEY CRYPTOGRAPHY
data. In this Cryptographic approach, a single key is used to
encrypt and decrypt the data. The key must be known to both
the clients to read/write the data. There are different methods
of Symmetric key Algorithm like DES, 3DES, AES, and
more.
(D). ASYMMETRIC KEY CRYPTOGRAPHY 6. Dr. Prerna Mahajan et al. proposed “A Study of
In this Cryptography approach, there are two different keys Encryption Algorithm AES, DES, and RSA for
to encrypt and decrypt the data. The key used to encrypt the Security,” Authors reviewed three encryption
data is called Public Key and the second key is used to techniques like AES, DES, and RSA mentioned the
decrypt the data called the Private key. Both keys are comparison results of the effectiveness of each
different from each other. Private Key is only available to algorithm.[7]
the receiver.
III. SYMMETRIC APPROACH
Symmetric Key Encryption takes less execution time and is
always easy to implement in real-life applications, yet their
drawback is that both clients need to move their key’s
security[8]. This approach highlights improving the standard
method of encryption by using the Substitution technique[4].
In this proposed algorithm, the first single character is
converted into its respective ASCII code value, and further
encryption continues.
• Decryption Algorithm
Step 1: Convert CipherText to Binary.
Step 2: Format the Binary to 8 digits by adding 0 on the left
side of the Binary is not already formatted.
Step 3: Find 2’s Compliment of the Binary got in Step 1.
Step 4: Split the Binary got in Step 2 into two halves as
element-1 and element-2.
Step 5: Find the 2’s Compliment for both equal parts and
store them in complementElement-1 and
complementElement-2, respectively.
Step 6: Concatenate complementElement-2 with
complementElement-1 Fig 6: Shows the architecture of the proposed decryption
Step 7: Reverse the Binary got from Step 5. Algorithm
Step 8: Find the ASCII value of the Binary got from Step 6.
Step 9: Subtract the Key 100 from the ASCII got in Step V. EXPERIMENTAL ANALYSIS
7.Step 10: Convert and return the ASCII value from Step 8 For experimental analysis, the proposed algorithm with the
to its respective Character value as Single Character. symmetric key is codded in Python 3.8.5. The i7