International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 128 | Views: 351

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017 | Popularity: 6.9 / 10


     

Encryption and Decryption Using Bit Operations

Gurubasava, Rajesh Budihal


Abstract: Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Only one particular element underlies many of the security mechanisms in use Cryptographic techniques hence our focus is on this area Cryptography. Cryptography is an emerging technology, which is important for network security. Research on cryptography is still in its developing stages and a considerable research effort is still required for secured communication. A day to day use of cryptography in our life is increasing tremendously, this is because of necessity of our protecting data from unauthorized access. As the days are passing the old algorithms are not remaining so strong as cryptanalyst are familiar with them. The proposed encryption algorithm, in which for every eight bytes of plain text it will produce seven bytes of cipher text and in decryption for every seven bytes of cipher text it will reproduce eight bytes of plain text to illustrates about the comparison of various data samples during encryption and decryption process which results in terms of better performance metrics such as data size, memory, and throughput value.


Keywords: Cryptography, cipher- text, encryption, decryption


Edition: Volume 6 Issue 6, June 2017


Pages: 1507 - 1513



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Gurubasava, Rajesh Budihal, "Encryption and Decryption Using Bit Operations", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 1507-1513, https://www.ijsr.net/getabstract.php?paperid=ART20174580, DOI: https://www.doi.org/10.21275/ART20174580



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 8, August 2021

Pages: 1126 - 1129

Privacy Preserving Utility Verification of Data Published

Madhushree M

Share this Article
Top