ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Encryption and Decryption Using Bit Operations

Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 6)

Publication Date:

Authors : ; ;

Page : 1507-1513

Keywords : Cryptography; cipher- text; encryption; decryption;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Only one particular element underlies many of the security mechanisms in use Cryptographic techniques hence our focus is on this area Cryptography. Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication. A day to day use of cryptography in our life is increasing tremendously, this is because of necessity of our protecting data from unauthorized access. As the days are passing the old algorithms are not remaining so strong as cryptanalyst are familiar with them. The proposed encryption algorithm, in which for every eight bytes of plain text it will produce seven bytes of cipher text and in decryption for every seven bytes of cipher text it will reproduce eight bytes of plain text to illustrates about the comparison of various data samples during encryption and decryption process which results in terms of better performance metrics such as data size, memory, and throughput value.

Last modified: 2021-06-30 19:12:46