INFORMATION SECURITY USING MODULATION TECHNIQUE
Journal: International Journal of Electronics and Communication Engineering and Technology (IJECET) (Vol.7, No. 1)Publication Date: 2016-02-26
Authors : SATISH KUMAR GARG; ARUN GAUR; S. P. GUPTA;
Page : 107-114
Keywords : Encryption; Decryption; C-NOT Gate; Swapping of Bits; Iaeme Publication; IAEME; Engineering; Electronics; Communication; IJECET;
Abstract
In the present work we have introduced a new cryptographic method, called algorithm SKG 3.11, for encryption and decryption of any text file at five stages (1) First, by converting each character into corresponding binary form using 8-bit ASCII Code thus we get 8N bits for a text of N characters (2) Secondly, by swapping the integral multiple of leftmost N1st bit with corresponding N1st rightmost bit till 4Nth bit if remainder of (8N+1/N1) is zero otherwise upto 8Nth bit (3) Thirdly, creating a binary string of 0’s and 1’s such that total number of 0’s and 1’s is 8N, the consecutive numbers of 0’s and 1’s in this string may be from 1 to 7 (4) Fourthly, using C-NOT Gate on binary strings obtained at stages two and three and (5) Finally, converting binary string obtained at stage four into corresponding characters using 8-bit ASCII Code. This algorithm can be applied to any text consisting of 10 or more characters. The results obtained after application of this algorithm are excellent and difficult to decrypt.
Other Latest Articles
- RESPONSE OF CHOLESTEROL IN THE PRESENCE OF ALANINE AND OTHER BLOOD CONSTITUENTS
- DESIGN AND IMPLEMENTATION OF FPGA BASED G CODE COMPATIBLE CNC LATHE CONTROLLER
- A SURVEY OF RADIATION HARDENING BY DESIGN (RHBD) TECHNIQUES FOR ELECTRONIC SYSTEMS FOR SPACE APPLICATION
- MINIATURISATION OF PATCH ANTENNA USING NOVEL FRACTAL GEOMETRY
- MODELING OF PLANAR METAMATERIAL STRUCTURE AND ITS EFFECTIVE PARAMETER EXTRACTION
Last modified: 2016-05-24 17:27:52