ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

The Book Cipher Optimised Method To Implement Encryption And Decryption

Journal: International Journal of Scientific & Technology Research (Vol.3, No. 1)

Publication Date:

Authors : ; ; ; ; ;

Page : 11-14

Keywords : Index Terms Book Cipher; Encrypted Key; Infinite Key Space; Hashing; Auto- Destruct.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Abstract We plan to re innovate the age old method of Encryption namely The Book Cipher which can be done by removing the constraints that made it obsolete in the first place. This can be done by providing a computerized touch to the Book Cipher reducing the size of the formed Cipher Text after encoding and creating an Encrypted Key for this Cipher. This system also provides an Infinite Key Space for the formed encryption. To introduce another level of security to this Cipher text we plan to further Hash the encrypted key and introduce an Auto-Destruct functionality to the Cipher Text.

Last modified: 2014-08-17 18:48:53