Downloads: 12 | Views: 301
Research Paper | Computer Science and Information Technology | India | Volume 10 Issue 6, June 2021 | Popularity: 5.1 / 10
Asymmetric New Cryptography Algorithm Based on ASCII Code
Yaser M.A. Abualkas, Arshed Raad Raheem
Abstract: Encryption is a process of generating secret text from the input text using a secret key and a encryption algorithm. Input text is referred to as plain text and the secret text generated is known as cipher text. Encryption algorithms are mainly divided into two categories which are symmetric key encryption algorithm and asymmetric key encryption algorithm. In Symmetric key encryption algorithm the same key is used by both sender and receiver but in asymmetric key algorithms use different keys for encryption and decryption. The keys are: Private Key and Public Key. The encryption key is public, decryption key is secret. Anyone can encrypt a message but only the one who knows the corresponding private key can decrypt it. The decryption key cannot be derived from the encryption key. Asymmetric key algorithms used for transmitting encryption keys or other data securely even when the parties have no opportunity to agree on a secret key in private. In this paper, we present a technique based on asymmetric key encryption algorithm which uses ASCII vales of input text to encrypt the data. Text data encryption techniques are very useful in data communication where one user want to send some secret messages to another users.
Keywords: Encryption, Decryption, ASCII con, Symmetric Encryption, Plain Text, Cipher Text, Cryptography, Diffie-Hellman , RSA, ElGamal, ECC, DSA
Edition: Volume 10 Issue 6, June 2021
Pages: 1 - 4
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 180 | Views: 322
Computer Science and Information Technology, India, Volume 9 Issue 4, April 2020
Pages: 187 - 189Wearable Forensic Traces and Security Challenges
Divya Premchandran
Downloads: 180 | Views: 380
Computer Science and Information Technology, India, Volume 9 Issue 7, July 2020
Pages: 1296 - 1299Quantum Computing
Shaifali Rastogi
Downloads: 177 | Views: 345
Computer Science and Information Technology, India, Volume 9 Issue 8, August 2020
Pages: 618 - 621Recognition of Vehicle by Number Plate by Automatic Number Plate Recognition System
Maruthi ST, Dr. Sanjay Pande MB, Bindhu K M, Divya I, Gauri N S, Megha V
Downloads: 156 | Views: 307
Computer Science and Information Technology, United States of America, Volume 9 Issue 3, March 2020
Pages: 1177 - 1179IT Infrastructure Business Contingency Plan
Anshuman Awasthi
Downloads: 152 | Views: 335
Computer Science and Information Technology, China, Volume 9 Issue 3, March 2020
Pages: 519 - 528Sparse Representation of Image with Immune Clone Algorithm based on Harmonic Wavelet Packet Dictionary
WANG Li, WANG Wei, LIU Boni