Security

Efficiency and Security of Data With Symmetric Encryption Algorithms

Free registration required

Executive Summary

In this paper, the authors proposed the encryption algorithm to encrypt plaintext to cipher text and the decryption algorithm to do the reverse. They applied the basic computing operations to design these algorithms in this study. They used the inserting dummy symbols, rotating, transposition, shifting, complement and inserting control byte to build the data and tables in the encryption algorithm. These operations are simple and easily to implement. Without knowing the data and tables of encryption, it is difficult to do cryptanalysis. In the decryption algorithm, they used these data and tables to decrypt cipher text to plaintext.

  • Format: PDF
  • Size: 675.8 KB