SlideShare a Scribd company logo
A.Vijayan.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 5) April 2016, pp.08-11
www.ijera.com 8|P a g e
ASCII Value Based Encryption System (AVB)
A.Vijayan1
, T.Gobinath2
,M.Saravanakarthikeyan3
1
(Department Of Information Technology, Chettinad College Of Engineering & Technology,Karur,)
2,3
(Assistant Professor Department Of Information Technology, Chettinad College Of Engineering &
Technology,Karur)
ABSTRACT
Encryption and decryption are considered to be the guard for data in this technological world. To provide some
kind of security, this paper proposes a new algorithm called AVB algorithm which is used to enhance the
security of the data. This algorithm mainly focuses on ASCII value of data. ASCII value of the character is
encrypted using normal mathematical calculation for number of time on a particular character and converted to
numerical value. Then the cipher text is decrypted to get the original plain text. This algorithm is efficient in two
ways it difficult for the intruders to predict the data as each character follows different form of encryption based
on the key. And also it is simple, fast, and cost efficient while compared to ASCII value based text encryption
system by Udepal Singh and Upasna Garg
I. INTRODUCTION
In technological world everything is easy
both attack and prevention. Every technology in
this High-fi world has vulnerability.Attacks from
the vulnerability can be minimized by drum card
“cryptography”. In cryptography Lots of methods
have been proposed by various cryptographers to
minimize the attack of intruder’s. Cryptography is
the science of using maths to encrypt and decrypt
data. Cryptography enables you to store secure
information or to be transmitted across vulnerable
network (like the Internet) so that it cannot be read
by anyone except the intended recipient .While
cryptography is the science of securing
data, cryptanalysis is the science of applying and
breaking secure communication. Classical
cryptanalysis involves an interesting combination
of analytical reasoning, application of mathematical
tools, pattern finding, patience, determination, and
luck.Level of security depends upon the algorithm
that has been used to produce cipher text, number
of round doesn’t matter where the logic of
algorithm matter’s. In order to fulfil the
requirements, many encryption schemes have been
proposed and analysed as possible solution
systems.
In this paper, a new cryptographic
algorithm is proposed, which follows a different
method using the ASCII value. This new method
provides security to data in a lower cost.
II. RELATED WORK
Udepal Singh, Upasna Gargencrypted the
data on the basis of Unicode values, in which the
security of data is increased [1].JGitanjali,
Dr.N.Jeyanthi, C.Ranichandra, M.Pounambal
proposed a newAlgorithm for encryption
Technique, UPMM algorithm, which is
applied on ASCII value of data. ASCII values are
encrypted using a key involving Palindrome
numbers and unique alphanumeric id, which is also
converted into ASCII value to provide
authentication over the network
[2].Dr.M.MohamedSathik, A. KalaiSelvi, proposed
data encryption anddecryption process using secret
sharing scheme, which is based on generating the
random polynomial and evaluates the mean value
of the polynomial’s coefficients. The mean value is
added with the ASCII value of the plain text to get
the cipher text [3].Prasant Sharma, Amit Kumar
Gupta analyzed the speed of RSA public key
cryptosystem to reduce the time taken for finding
factor for a large number [4].SubhranilSom,
DipanjanMitra, JhilomHaldarproposed an
algorithm in which A Key is created from the
input. Generating different randomized Matrices
forms the Key. The value of the generated is
manipulated with the individual ASCII values of
the plain text. After completion of this process all
the different resultant ASCII values will be further
converted into their corresponding binary values
[5].Dhavelvegad Husain Ullah khan NimishGhosh
proposed an algorithm in which length of the key is
calculated by adding any two random characters at
starting and ending of a text and Ascii value of
each character is calculated and shift operation is
performed. They also tried encrypting file in the
same manner[6].SatyajeetR.Shinge and Rahul Patil
Proposed an algorithm in which uses Ascii value of
the plain text to encrypt it, this system randomly
generates a key for user having equal to length of
the plain text. The randomly generated key is
converted to another key which is used for
RESEARCH ARTICLE OPEN ACCESS
A.Vijayan.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 5) April 2016, pp.08-11
www.ijera.com 9|P a g e
decryption purpose[7].m.lavanyaR.vijaysai
proposed an idea which is based on Ascii value and
random number generator to achieve data security
and prevent unauthorized person from meddling
secret data [8].AnupamKumarBairagi proposed an
algorithm in which every character can be
represented as an ASCII value which is either even
or odd .depending upon this evenness or oddness,
the character is encrypted differently [9].
III. LITERATURE SURVEY
Cryptography is the art of writing or
solving codes. The main objective of cryptography
is to provide security to the data in this vulnerable
world. Cryptography mainly focuses upon
encryption and decryption. Cryptography
concentrates on confidentiality, integrity,
authentication, access control.
Encryption
Decryption
Encryption:
Encryption is the concept of altering or
modifying the original data (plain text) into some
meaningless or sometime meaningful data but
which is not same as compared to the plain text.
Encryption uses some logic to convert plain text to
cipher text. The logic can be done in two ways with
or without key.
Symmetric key
Asymmetric key
Symmetric key:
It is one of the method in encryption this
type of encryption uses same key on both sender
and receiver side to encrypt and decrypt data. The
length of the key and type of data which we use as
a key is strength of algorithm as well as security of
data.
Asymmetric key:It is one of the method in
encryption this type of encryption uses different
key on both sender and receiver side to encrypt and
decrypt data. In this method public and private key
is used in which if public key is used for encryption
then private key is used for decryption and vice
versa.
Decryption:
Decryption is the reverse process of
encryption, in which the cipher text is converted to
plain text using same method followed in
encryption.
IV. PROPOSED METHOD
[1] Encryption phase
In this algorithm the information to be
encrypted is fetched. The fetched data is stored in
an array of characters, the characters are converted
into their corresponding ASCII values. Square root
for the ASCII values are found for “N” times where
N is derived from Key string. The key which is
used to encrypt the information is encrypted. Key
string is stored in an array after taking ASCII value
for all the characters in the key string. Square root
for ASCII value of the key string is taken for
“N”times. Finally an array consist of floating point
numbers is the cipher text. This encryption phase
continues until all the characters are encrypted.
Then cipher text is sent to the receiver end
.
(II)Pseudo codefor Encryption:
The pseudo code for encryption phase is as follows
[2] Decryption phase
Decryption is the vice-versa of encryption
in which the cipher text is converted back to plain
text (original text).it uses the same methodology
followed in encryption. Decryption is critical phase
since authentication is must and also we have to
make sure that there is no changes in the data while
transmission. There are several methods followed
to meet the above mentioned criteria. Decryption in
this proposed algorithm is as follows,fetch the
cipher text which is in the form of floating point
numbers both the encrypted data and key and
square the cipher text for “N” times if only the key
string matches. As a result of squaring a whole
number is formed which is the ASCII value of the
character. The ASCII value is converted into
corresponding character based on the ASCII
values, which is the original data or plain text. The
algorithm for decryption is shown below.
Pseudo codefor Decryption:
A.Vijayan.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 5) April 2016, pp.08-11
www.ijera.com 10|P a g e
The pseudo code for Decryption phase is as follows
V. RESULT
The proposed algorithm is implemented as
a project for encrypting and decrypting both files
and data. The result of encryption and decryption
is as follows.
[a] Encryption of text message:
There are several algorithms available to
provide security to the data. In this we are
demonstrating the proposed algorithm in practical
aspect. The snapshot shown below is the output of
this algorithm. The procedure to perform
encryption is as follows. To encrypt the text
message input the message/data in the Text Box
and then click encrypt button to perform encryption
and the result is displayed in the resultant text box.
:
[a] Encryption of file:
The proposed method is also implemented
for encrypting the files. Since file sharing and
uploading is most common means of
communication between two parties now a days. It
is used to provide security to files while uploading
and sharing via internet. The procedure to perform
this is, the user browses the file to be encrypted and
fetch the original file. The file is encrypted on
clicking the encrypt button and the encrypted file is
saved in a location and address is displayed to the
user.
[a] Decryption of text message:
As mentioned earlier decryption is the
reverse process of encryption. Demonstration of
decryption is as follows, to decrypt the text
message, just click in decrypt button and the cipher
text in text box is converted to plain text (original
text).
[b] Decryption of file:
Procedure to decrypt the file is, user
browses the file to be decrypted and fetch the
encrypted file. The file is decrypted on clicking the
decrypt button and the decrypted file is saved in a
location and address is displayed to the user.
A.Vijayan.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 5) April 2016, pp.08-11
www.ijera.com 11|P a g e
VI. CONCLUSION
In this paper we proposed an algorithm to
encrypt and decrypt data using ASCII value further
no additional data is added so it is difficult to find
out the original data also in this algorithm the data
is encrypted after going through the several rounds.
It is difficult to predict since key string also
encrypted.
VII. FUTURE WORKS
With the proposal of this paper as a base
we are working on to implement this algorithm on
all file formats in future also we will implement
this algorithm in asymmetric key based encryption,
decryption system.
REFERENCES
Journal papers:
[1]. Udepal Singh, Upasna Garg ; An ASCII
value based text data encryption System in
International Journal of Scientific and
Research Publications, Volume 3, Issue
11, November 2013 1 ISSN 2250-3153.
[2]. SubhranilSom,
DipanjanMitra,JhilomHaldar; Session Key
Based Manipulated Iteration Encryption
Technique (SKBMIET),2008 International
Conference on Advanced Computer
Theory and Engineering.
[3]. Satyajeet R. Shinge, Rahul Patil, An
encryption algorithm Based on ASCII
value of data, international journal of
computer science and information
technologies,vol 5(6),2014,7232-7234
[4]. DhavalVegad Husain Ullah Khan,
character based encryption and decryption
using modulo arithmetic,international;
journal of science
technology&engineering|volume 1|issue
10|april 2015
Ad

More Related Content

What's hot (20)

IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
prashantdahake
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption
IJECEIAES
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
AnirbanBhowmik8
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
 
CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit v
ArthyR3
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
Universitas Pembangunan Panca Budi
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
Editor IJCATR
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
International Journal of Computer and Communication System Engineering
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
Alexander Decker
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
Alexander Decker
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
chovatiyabhautik
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
Mathan Gopal
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
ijcsa
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
 
Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption Features of genetic algorithm for plain text encryption
Features of genetic algorithm for plain text encryption
IJECEIAES
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
AnirbanBhowmik8
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
 
CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit v
ArthyR3
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
Editor IJCATR
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
Alexander Decker
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
Alexander Decker
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
chovatiyabhautik
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
Mathan Gopal
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
ijcsa
 

Similar to ASCII Value Based Encryption System (AVB) (20)

File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
IJERA Editor
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
IJERA Editor
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
IRJET Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
Joe Osborn
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET Journal
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
IJECEIAES
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
IAEME Publication
 
N45028390
N45028390N45028390
N45028390
IJERA Editor
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
Stacy Taylor
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
IJERA Editor
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
ijtsrd
 
A tool to evaluate symmetric key algorithms
A tool to evaluate symmetric key algorithmsA tool to evaluate symmetric key algorithms
A tool to evaluate symmetric key algorithms
Tharindu Weerasinghe
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
IJCSIS Research Publications
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
IRJET Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
Joe Osborn
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET Journal
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
IJECEIAES
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
IAEME Publication
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
Stacy Taylor
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
IJERA Editor
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
ijtsrd
 
A tool to evaluate symmetric key algorithms
A tool to evaluate symmetric key algorithmsA tool to evaluate symmetric key algorithms
A tool to evaluate symmetric key algorithms
Tharindu Weerasinghe
 
Ad

Recently uploaded (20)

最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
Taqyea
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Reese McCrary_ The Role of Perseverance in Engineering Success.pdf
Reese McCrary_ The Role of Perseverance in Engineering Success.pdfReese McCrary_ The Role of Perseverance in Engineering Success.pdf
Reese McCrary_ The Role of Perseverance in Engineering Success.pdf
Reese McCrary
 
Compiler Design_Intermediate code generation new ppt.pptx
Compiler Design_Intermediate code generation new ppt.pptxCompiler Design_Intermediate code generation new ppt.pptx
Compiler Design_Intermediate code generation new ppt.pptx
RushaliDeshmukh2
 
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Journal of Soft Computing in Civil Engineering
 
Novel Plug Flow Reactor with Recycle For Growth Control
Novel Plug Flow Reactor with Recycle For Growth ControlNovel Plug Flow Reactor with Recycle For Growth Control
Novel Plug Flow Reactor with Recycle For Growth Control
Chris Harding
 
Compiler Design_Syntax Directed Translation.pptx
Compiler Design_Syntax Directed Translation.pptxCompiler Design_Syntax Directed Translation.pptx
Compiler Design_Syntax Directed Translation.pptx
RushaliDeshmukh2
 
Resistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff modelResistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff model
INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR
 
W1 WDM_Principle and basics to know.pptx
W1 WDM_Principle and basics to know.pptxW1 WDM_Principle and basics to know.pptx
W1 WDM_Principle and basics to know.pptx
muhhxx51
 
Surveying through global positioning system
Surveying through global positioning systemSurveying through global positioning system
Surveying through global positioning system
opneptune5
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
The Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLabThe Gaussian Process Modeling Module in UQLab
The Gaussian Process Modeling Module in UQLab
Journal of Soft Computing in Civil Engineering
 
Compiler Design_Code generation techniques.pptx
Compiler Design_Code generation techniques.pptxCompiler Design_Code generation techniques.pptx
Compiler Design_Code generation techniques.pptx
RushaliDeshmukh2
 
COMPUTER GRAPHICS AND VISUALIZATION :MODULE-1 notes [BCG402-CG&V].pdf
COMPUTER GRAPHICS AND VISUALIZATION :MODULE-1 notes [BCG402-CG&V].pdfCOMPUTER GRAPHICS AND VISUALIZATION :MODULE-1 notes [BCG402-CG&V].pdf
COMPUTER GRAPHICS AND VISUALIZATION :MODULE-1 notes [BCG402-CG&V].pdf
Alvas Institute of Engineering and technology, Moodabidri
 
Interfacing PMW3901 Optical Flow Sensor with ESP32
Interfacing PMW3901 Optical Flow Sensor with ESP32Interfacing PMW3901 Optical Flow Sensor with ESP32
Interfacing PMW3901 Optical Flow Sensor with ESP32
CircuitDigest
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
Taqyea
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Reese McCrary_ The Role of Perseverance in Engineering Success.pdf
Reese McCrary_ The Role of Perseverance in Engineering Success.pdfReese McCrary_ The Role of Perseverance in Engineering Success.pdf
Reese McCrary_ The Role of Perseverance in Engineering Success.pdf
Reese McCrary
 
Compiler Design_Intermediate code generation new ppt.pptx
Compiler Design_Intermediate code generation new ppt.pptxCompiler Design_Intermediate code generation new ppt.pptx
Compiler Design_Intermediate code generation new ppt.pptx
RushaliDeshmukh2
 
Novel Plug Flow Reactor with Recycle For Growth Control
Novel Plug Flow Reactor with Recycle For Growth ControlNovel Plug Flow Reactor with Recycle For Growth Control
Novel Plug Flow Reactor with Recycle For Growth Control
Chris Harding
 
Compiler Design_Syntax Directed Translation.pptx
Compiler Design_Syntax Directed Translation.pptxCompiler Design_Syntax Directed Translation.pptx
Compiler Design_Syntax Directed Translation.pptx
RushaliDeshmukh2
 
W1 WDM_Principle and basics to know.pptx
W1 WDM_Principle and basics to know.pptxW1 WDM_Principle and basics to know.pptx
W1 WDM_Principle and basics to know.pptx
muhhxx51
 
Surveying through global positioning system
Surveying through global positioning systemSurveying through global positioning system
Surveying through global positioning system
opneptune5
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
Compiler Design_Code generation techniques.pptx
Compiler Design_Code generation techniques.pptxCompiler Design_Code generation techniques.pptx
Compiler Design_Code generation techniques.pptx
RushaliDeshmukh2
 
Interfacing PMW3901 Optical Flow Sensor with ESP32
Interfacing PMW3901 Optical Flow Sensor with ESP32Interfacing PMW3901 Optical Flow Sensor with ESP32
Interfacing PMW3901 Optical Flow Sensor with ESP32
CircuitDigest
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
Ad

ASCII Value Based Encryption System (AVB)

  • 1. A.Vijayan.et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 5) April 2016, pp.08-11 www.ijera.com 8|P a g e ASCII Value Based Encryption System (AVB) A.Vijayan1 , T.Gobinath2 ,M.Saravanakarthikeyan3 1 (Department Of Information Technology, Chettinad College Of Engineering & Technology,Karur,) 2,3 (Assistant Professor Department Of Information Technology, Chettinad College Of Engineering & Technology,Karur) ABSTRACT Encryption and decryption are considered to be the guard for data in this technological world. To provide some kind of security, this paper proposes a new algorithm called AVB algorithm which is used to enhance the security of the data. This algorithm mainly focuses on ASCII value of data. ASCII value of the character is encrypted using normal mathematical calculation for number of time on a particular character and converted to numerical value. Then the cipher text is decrypted to get the original plain text. This algorithm is efficient in two ways it difficult for the intruders to predict the data as each character follows different form of encryption based on the key. And also it is simple, fast, and cost efficient while compared to ASCII value based text encryption system by Udepal Singh and Upasna Garg I. INTRODUCTION In technological world everything is easy both attack and prevention. Every technology in this High-fi world has vulnerability.Attacks from the vulnerability can be minimized by drum card “cryptography”. In cryptography Lots of methods have been proposed by various cryptographers to minimize the attack of intruder’s. Cryptography is the science of using maths to encrypt and decrypt data. Cryptography enables you to store secure information or to be transmitted across vulnerable network (like the Internet) so that it cannot be read by anyone except the intended recipient .While cryptography is the science of securing data, cryptanalysis is the science of applying and breaking secure communication. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools, pattern finding, patience, determination, and luck.Level of security depends upon the algorithm that has been used to produce cipher text, number of round doesn’t matter where the logic of algorithm matter’s. In order to fulfil the requirements, many encryption schemes have been proposed and analysed as possible solution systems. In this paper, a new cryptographic algorithm is proposed, which follows a different method using the ASCII value. This new method provides security to data in a lower cost. II. RELATED WORK Udepal Singh, Upasna Gargencrypted the data on the basis of Unicode values, in which the security of data is increased [1].JGitanjali, Dr.N.Jeyanthi, C.Ranichandra, M.Pounambal proposed a newAlgorithm for encryption Technique, UPMM algorithm, which is applied on ASCII value of data. ASCII values are encrypted using a key involving Palindrome numbers and unique alphanumeric id, which is also converted into ASCII value to provide authentication over the network [2].Dr.M.MohamedSathik, A. KalaiSelvi, proposed data encryption anddecryption process using secret sharing scheme, which is based on generating the random polynomial and evaluates the mean value of the polynomial’s coefficients. The mean value is added with the ASCII value of the plain text to get the cipher text [3].Prasant Sharma, Amit Kumar Gupta analyzed the speed of RSA public key cryptosystem to reduce the time taken for finding factor for a large number [4].SubhranilSom, DipanjanMitra, JhilomHaldarproposed an algorithm in which A Key is created from the input. Generating different randomized Matrices forms the Key. The value of the generated is manipulated with the individual ASCII values of the plain text. After completion of this process all the different resultant ASCII values will be further converted into their corresponding binary values [5].Dhavelvegad Husain Ullah khan NimishGhosh proposed an algorithm in which length of the key is calculated by adding any two random characters at starting and ending of a text and Ascii value of each character is calculated and shift operation is performed. They also tried encrypting file in the same manner[6].SatyajeetR.Shinge and Rahul Patil Proposed an algorithm in which uses Ascii value of the plain text to encrypt it, this system randomly generates a key for user having equal to length of the plain text. The randomly generated key is converted to another key which is used for RESEARCH ARTICLE OPEN ACCESS
  • 2. A.Vijayan.et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 5) April 2016, pp.08-11 www.ijera.com 9|P a g e decryption purpose[7].m.lavanyaR.vijaysai proposed an idea which is based on Ascii value and random number generator to achieve data security and prevent unauthorized person from meddling secret data [8].AnupamKumarBairagi proposed an algorithm in which every character can be represented as an ASCII value which is either even or odd .depending upon this evenness or oddness, the character is encrypted differently [9]. III. LITERATURE SURVEY Cryptography is the art of writing or solving codes. The main objective of cryptography is to provide security to the data in this vulnerable world. Cryptography mainly focuses upon encryption and decryption. Cryptography concentrates on confidentiality, integrity, authentication, access control. Encryption Decryption Encryption: Encryption is the concept of altering or modifying the original data (plain text) into some meaningless or sometime meaningful data but which is not same as compared to the plain text. Encryption uses some logic to convert plain text to cipher text. The logic can be done in two ways with or without key. Symmetric key Asymmetric key Symmetric key: It is one of the method in encryption this type of encryption uses same key on both sender and receiver side to encrypt and decrypt data. The length of the key and type of data which we use as a key is strength of algorithm as well as security of data. Asymmetric key:It is one of the method in encryption this type of encryption uses different key on both sender and receiver side to encrypt and decrypt data. In this method public and private key is used in which if public key is used for encryption then private key is used for decryption and vice versa. Decryption: Decryption is the reverse process of encryption, in which the cipher text is converted to plain text using same method followed in encryption. IV. PROPOSED METHOD [1] Encryption phase In this algorithm the information to be encrypted is fetched. The fetched data is stored in an array of characters, the characters are converted into their corresponding ASCII values. Square root for the ASCII values are found for “N” times where N is derived from Key string. The key which is used to encrypt the information is encrypted. Key string is stored in an array after taking ASCII value for all the characters in the key string. Square root for ASCII value of the key string is taken for “N”times. Finally an array consist of floating point numbers is the cipher text. This encryption phase continues until all the characters are encrypted. Then cipher text is sent to the receiver end . (II)Pseudo codefor Encryption: The pseudo code for encryption phase is as follows [2] Decryption phase Decryption is the vice-versa of encryption in which the cipher text is converted back to plain text (original text).it uses the same methodology followed in encryption. Decryption is critical phase since authentication is must and also we have to make sure that there is no changes in the data while transmission. There are several methods followed to meet the above mentioned criteria. Decryption in this proposed algorithm is as follows,fetch the cipher text which is in the form of floating point numbers both the encrypted data and key and square the cipher text for “N” times if only the key string matches. As a result of squaring a whole number is formed which is the ASCII value of the character. The ASCII value is converted into corresponding character based on the ASCII values, which is the original data or plain text. The algorithm for decryption is shown below. Pseudo codefor Decryption:
  • 3. A.Vijayan.et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 5) April 2016, pp.08-11 www.ijera.com 10|P a g e The pseudo code for Decryption phase is as follows V. RESULT The proposed algorithm is implemented as a project for encrypting and decrypting both files and data. The result of encryption and decryption is as follows. [a] Encryption of text message: There are several algorithms available to provide security to the data. In this we are demonstrating the proposed algorithm in practical aspect. The snapshot shown below is the output of this algorithm. The procedure to perform encryption is as follows. To encrypt the text message input the message/data in the Text Box and then click encrypt button to perform encryption and the result is displayed in the resultant text box. : [a] Encryption of file: The proposed method is also implemented for encrypting the files. Since file sharing and uploading is most common means of communication between two parties now a days. It is used to provide security to files while uploading and sharing via internet. The procedure to perform this is, the user browses the file to be encrypted and fetch the original file. The file is encrypted on clicking the encrypt button and the encrypted file is saved in a location and address is displayed to the user. [a] Decryption of text message: As mentioned earlier decryption is the reverse process of encryption. Demonstration of decryption is as follows, to decrypt the text message, just click in decrypt button and the cipher text in text box is converted to plain text (original text). [b] Decryption of file: Procedure to decrypt the file is, user browses the file to be decrypted and fetch the encrypted file. The file is decrypted on clicking the decrypt button and the decrypted file is saved in a location and address is displayed to the user.
  • 4. A.Vijayan.et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 5) April 2016, pp.08-11 www.ijera.com 11|P a g e VI. CONCLUSION In this paper we proposed an algorithm to encrypt and decrypt data using ASCII value further no additional data is added so it is difficult to find out the original data also in this algorithm the data is encrypted after going through the several rounds. It is difficult to predict since key string also encrypted. VII. FUTURE WORKS With the proposal of this paper as a base we are working on to implement this algorithm on all file formats in future also we will implement this algorithm in asymmetric key based encryption, decryption system. REFERENCES Journal papers: [1]. Udepal Singh, Upasna Garg ; An ASCII value based text data encryption System in International Journal of Scientific and Research Publications, Volume 3, Issue 11, November 2013 1 ISSN 2250-3153. [2]. SubhranilSom, DipanjanMitra,JhilomHaldar; Session Key Based Manipulated Iteration Encryption Technique (SKBMIET),2008 International Conference on Advanced Computer Theory and Engineering. [3]. Satyajeet R. Shinge, Rahul Patil, An encryption algorithm Based on ASCII value of data, international journal of computer science and information technologies,vol 5(6),2014,7232-7234 [4]. DhavalVegad Husain Ullah Khan, character based encryption and decryption using modulo arithmetic,international; journal of science technology&engineering|volume 1|issue 10|april 2015