Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Simple Encryption/Decryption Application.
Majdi Al-qdah, Lin Yi Hui
Pages - 33 - 40 | Revised - 15-06-2007 | Published - 30-06-2007
MORE INFORMATION
KEYWORDS
Encryption, Decryption, Rotation, XOR
ABSTRACT
This paper presents an Encryption/Decryption application that is able to work
with any type of file; for example: image files, data files, documentation files…etc.
The method of encryption is simple enough yet powerful enough to fit the needs
of students and staff in a small institution. The application uses simple key
generation method of random number generation and combination. The final
encryption is a binary one performed through rotation of bits and XOR operation
applied on each block of data in any file using a symmetric decimal key. The key
generation and Encryption are all done by the system itself after clicking the
encryption button with transparency to the user. The same encryption key is also
used to decrypt the encrypted binary file.
1 | Alimi, I. A., & Aboderin, O. (2015). Enhanced encryption algorithm based on a modified confusion and diffusion scheme. American Journal of Mobile Systems, Applications and Services, 1(1), 20-29. |
2 | Saqib, Z., Shahid, M. A., & Ashraf, M. U. Encryption and Decryption Using Automata Theory. |
3 | Gandhi, R. A., & Gosai, A. M. (2015). A Study on Current Scenario of Audio Encryption. International Journal of Computer Applications, 116(7), 13-17. |
4 | Amounas, f. international journal of engineering sciences & research technology a multi-level approach of elliptic curve cryptosystem for enhanced security of amazigh alphabet using cellular automata. |
5 | Prasad, M. R. (2015). Improving RGB Data Security with Advance Cryptography Algorithm. |
6 | Gosai, D. A. M. (2015). International Journal of Computer Applications. |
7 | Kalidasan, S., & Pandian, P. Available Online through Research Article www. ijptonline. com. |
8 | Osho, O., Zubair, Y. O., Ojeniyi, J. A., & Osho, L. O. a simple encryption and decryption system. |
9 | Singh, V., Dhiman, H., & Khatkar, M. (2014). a comprehensive study of time complexity of various encryption algorithms. international journal of advances in engineering & technology, 7(2), 495. |
10 | Gowraj, N., Avireddy, S., & Prabhu, S. SDI-ON: Secure Digital Images over the Network. |
11 | Ashik, M. H. M., & Vydehi, M. S. Secure Symmetric Key Algorithm [SSKA] For Information Exchange Using Modulo. |
12 | Mushtaque, M. A., & Singh, M. K. Feasibility Evaluation of Symmetric Key Encryption Techniques for Wireless Channel and Disk Storage. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2. |
13 | Gupta, R. K., & Singh, P. (2013). A new way to design and implementation of hybrid crypto system for security of the information in public network. International Journal of Emerging Technology and Advanced Engineering, 3(8), 108-115. |
14 | Sinha, S. K., Shrivastava, M., & Pandey, K. K. (2013). A New Way of Design and Implementation of Hybrid Encryption to Protect Confidential Information from Malicious Attack in Network. system, 6, 7. |
15 | Jain, S. A New Approach of Dynamic Encryption using Steganography. |
16 | Das, D., Lanjewar, U. A., & Sharma, S. J. Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS. |
17 | Msvs, B. R., Vardhan, V., & Reddy, P. A noval security model for indic scripts-a case study on Telugu. Int. J. Comput. Sci. Secur.(IJCSS), 3(4), 303. |
18 | Rahman, M. (2012). Any File Encryption by Translating ASCII Value of Characters. International Journal of Advanced Research in Computer Science, 3(2). |
19 | EL-ARABY, W. S. M. S. (2012). Video Watermarking Implementation Based on fpga (doctoral dissertation, arab academy for science). |
20 | Masum, M. R. (2012). Any File Encryption by Translating ASCII Value of Characters. International Journal of Advanced Research in Computer Science, 3(2). |
21 | 2. R.Dhanalakshmi and Dr.C.Chellappan , “Secure Email – Ensuring CIA (Confidentiality, Integrity and Authentication) and Privacy for Organizations”, in International Conference on Environment, Economics, Energy, Devices, Systems, Communications, Computers, Mathematics, University Center Drobeta Turnu Severin, Romania, October 27-29, 2011. |
22 | B. Raju MSVS, V. B Vishnu, G. A. Naidu, R. L. Pratap and B. A Vinaya, “A Noval Security Model for Indic Scripts- A Case Study on Telugu”, International Journal of Computer Science and Security, (IJCSS), 3(4), pp. 303 – 313, 2009. |
Agnew G. B., Mullin R. C., Onyszchuk I. M., and Vqanstone S. A. “An Implementation for a Fast Public-Key Cryptosystems”. Journal of Cryptology, Vol.3, No 2, PP. 63-79. 1995. | |
Andy Wilson , “Tips and Tricks: XOR Encryption” http://www.andyw.com/director/xor.asp , 1998. | |
Artur Ekert, Carolina Moura Alves, Ajay Gopinathan, “History of Cryptography”. | |
Baraka H., El-Manawy H. A., and Attiya A. “An Integrated Model for Internet Security Using Prevention and Detection Techniques”. IEEE Journal of Computer and Communication Vol. 99, PP. 25-33. 1998 | |
Beth T. and Gollmann D. “Algorithm Engineering for Public Key Algorithms”. IEEE Journal on Selected Areas in Communications; Vol. 7, No 4, PP. 458-466. 1989 | |
Cryptomathic, “E-SECURITY DICTIONARY”, http://www.cryptomathic.com/labs/techdict.html , 2003. | |
Dariusz Stanislawek , “Free Software copyright 1997 - 2006 ” http://members.ozemail.com.au/~nulifetv/freezip/freeware | |
Freeman J., Neely R., and Megalo L. “Developing Secure Systems: Issues and Solutions”. IEEE Journal of Computer and Communication, Vol. 89, PP. 36-45. 1998 | |
IBM. “The Data Encryption Standard (DES) and its strength against attacks”. IBM Journal of Research and Development, Vol. 38, PP. 243-250. 1994 | |
Microsoft, "Encrypting File System for Windows 2000", http://www.microsoft.com/windows2000/techinfo/howitworks/security/encrypt.asp, 1998. | |
NeoCrypt, “NeoCrypt File Protection Utility” , http://sourceforge.net/projects/neocrypt | |
Vivek Thakur , “NeekProtect”, http://neekprotect.sourceforge.net , 2006. | |
Wikipedia , “Bitwise operation” , http://en.wikipedia.org/wiki/Bitwise_operation , last modified on10 December 2006. | |
Wikipedia, “Encryption”, http://en.wikipedia.org/wiki/Encryption, modified on 13 December 2006. | |
Dr. Majdi Al-qdah
- Malaysia
majdi.qdah@mmu.edu.my
Mr. Lin Yi Hui
Faculty of Information Technology - Malaysia
|
|
|
|
View all special issues >> | |
|
|