Nearest Prime Cipher for Data Confidentiality and Integrity
Journal: International Journal of Advanced Networking and Applications (Vol.7, No. 06)Publication Date: 2016-05-30
Authors : S. Kiran; N. Subramanyan; Y. Suma; K. Haripriya;
Page : 2944-2948
Keywords : 2’s complement; Ciphertext; Cryptography; Nearest prime number; Plaintext; XOR operation;
Abstract
Communication is the process of transmitting information from source to destination. The information exchanged between sender and receiver through the proper channel. The information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information cryptography techniques are used. The key is playing prominent role in cryptography. This paper proposes a novel method for key generation by using nearest primes. Further 2’s complement and logical operations are used in encryption and decryption process. The final cipher text is generated by representing the intermediate cipher in matrix form and then read by column wise.
Other Latest Articles
- Multiple sequence alignment for phylogenetic tree construction
- Sequence Analysis and Phylogenetic tree construction Using Jukes Cantor Model
- Design and Manufacture of Plastic Injection Mould Cavity for “Base Cover of Bus Ticketing Machine”
- A Study on Putonghua Proficiency Test Management Models
- THE COMPETENCE CENTER IS A NEW ORGANIZATIONAL FORM FOR COMPLEX SOLUTION OF PROBLEMS OF DEVELOPMENT OF THE ORGANIZATION
Last modified: 2016-07-15 16:16:28