ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Secure Symmetric Key Algorithm [SSKA] For Information Exchange Using Modulo 67

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 2)

Publication Date:

Authors : ; ;

Page : 983-987

Keywords : Cryptography; Plain Text (PT); Cipher Text (CT); Key generation; Symmetric Key; Encryption & Decryption.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The e-data usage is increasing day by day. Nowadays exchange of data over the internet is increased higher than before. Security is the main issue in communication over a network. Protection must be given against attackers. Solutions for network security comes with concepts like cryptography in which distribution of keys have been done. Cryptography plays a vital role in providing security. There are two types of cryptography mechanism: Symmetric and Asymmetric Key. Symmetric Key use single key for encryption and decryption whereas Asymmetric Key uses two keys one for encryption another for decryption. The most commonly used algorithm is Symmetric Key algorithms. The power or strength of these algorithms is based on the difficulty to break the original messages. In this paper, new modulo 67 Symmetric Key algorithm method is proposed Three keys are used in which one is a user entered key which is converted into ASCII and binary then first key is produced and second natural number is entered by user which is used to find the inverse of modulo 67. Third key is generated just like second key generation method. The proposed algorithm is used for Encryption and Decryption.

Last modified: 2014-09-03 22:41:29