Cryptography allows information to be sent in
secure form.Information security protects data availability,
privacy and integrity. If we are protecting confidential
information then cryptography provides high level of privacy
of individuals and groups. Access to stored information on
computer databases has increased greatly. More companies
store business and individual information on computer than
ever before. Much of the information stored is highly
confidential and not for public viewing. In this paper a new
cryptography algorithm which is based on block cipher
concept is presented. In this algorithm logical operation like
XOR and shifting operation is used. Experimental results show
that proposed algorithm is very efficient and secured.
Published In : IJCSN Journal Volume 3, Issue 6
Date of Publication : December 2014
Pages : 521 - 524
Figures : 05
Tables : 02
Publication Link : A Step Ahead For Improving Data Security
From the result its isclear that our “proposed technique”
is better result producing as compared “DJSA symmetric
key algorithm” and “Effect of Security Increment to
Symmetric Data Encryption through AES
Methodology”. If any user emphasis on security then he
can use our proposed algorithm. Our method is
essentially block cipher method and it will take less time
if the file size is large. The important thing of our
proposed method is that it is almost impossible to break
the encryption algorithm without knowing the exact key
value. We propose that this encryption method can be
applied for data encryption and decryption in any type of
public application for sending confidential data.
[1] DriptoChatterjee, JoyshreeNath, SuvadeepDasgupta,
AsokeNath “A new Symmetric key Cryptography
Algorithm using extended MSA method: DJSA
symmetric key algorithm” published in 2011
International Conference on Communication Systems
and Network Technologies, 978-0-7695-4437-3/11
$26.00 © 2011 IEEE
[2] Wang and Ming Hu “Timing evaluation of the known
cryptographic algorithms “2009 International
Conference on Computational intelligence and security.
[3] key cryptography using random key generator, A.Nath,
S.Ghosh, M.A.Mallik, Proceedings of International
conference on SAM-2010 held at Las Vegas(USA) 12-
15 July,2010, Vol-2,P-239-244.
[4] Data Hiding and Retrieval, A.Nath, S.Das,
A.Chakrabarti, Proceedings of IEEE International
conference on Computer Intelligence and Computer
Network held at Bhopal from 26-28 Nov, 2010.
[5] Neal Koblitz “A Course in Number Theory
and Cryptography” Second Edition Published by
Springer
[6] By Klaus Felten “An Algorithm for Symmetric
Cryptography with a wide range of scalability”
published by 2nd International Workshop on
Embedded Systems, Internet Programming and
Industial IT.
[7] Majdi Al-qdah& Lin Yi Hui “Simple
Encryption/Decryption Application” published in
International