A New Method Encryption and Decryption
نویسندگان
چکیده
منابع مشابه
A New Polybit Shuffling Encryption and Decryption Algorithm Based on N Dimensional Encryption-Decryption Matrix
This paper elaborates polybit shuffling encryption and decryption algorithm based on N Dimensional encryption-decryption matrix which is an attempt to improve over the Classical Playfair Cipher. The unique feature of this algorithm is that it retains the simplicity of Classical Playfair Cipher but increases the robustness against crypto-attack by many folds. Moreover this algorithm can be used ...
متن کاملSri Ramshalaka: a Vedic Method of Text Encryption and Decryption
Abstract: This paper investigates the usability of SriRamshalakha, a vedic tool used in Indian Astrology, in the encryption and decryption of plain English text. Sri Ram Shalaka appears in Sri RamChartmanas, one of the very popular sacred epic of Hindu religion, written by great Saint Tulsidasji. SriRamshalakha is used to fetch/infer the approximate answer of questions/decisions by the believer...
متن کاملA New Design of Encryption/Decryption for Field Applications
Using the concept of one-time pad, in 2009, Ramasamy et al. proposed a new encryption/decryption algorithm for field applications. So the whole protocol has a short valid lifetime such that the secret information captured becomes irrelevant after a lapse of time. However, this article presents that Ramasamy et al.’s method is still vulnerable. Based on the geometric property of line, we propose...
متن کاملLeakage resistant encryption and decryption
Introduction Data encryption and decryption operations are basic building blocks for most security applications. For this purpose, most systems use block ciphers, such as the public AES standard. It is well known, however, that implementations of block ciphers such as AES, as well as other cryptographic algorithms, are subject to side-channel attacks [1]. These attacks allow adversaries to extr...
متن کاملDistributed Encryption and Decryption Algorithms
In this paper, we describe distributed encryption and decryption algorithms. These algorithms are required in order to make a dependable distributed data storage system in which data is stored in an encrypted form resilient to a number of arbitrarily faulty nodes in the system. By execution of these algorithms, a group of n nodes is able to encrypt or decrypt data with any secret cryptographic ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Webology
سال: 2021
ISSN: 1735-188X,1735-188X
DOI: 10.14704/web/v18i1/web18002