Network Security Using Double Symmetric Key: Algorithm SKG 2.3

Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
Topic: Security
Format: PDF
In this paper, named algorithm SKG 2.3, the author has used double symmetric key for network security. For encryption and decryption of any text file, the symmetric keys are used at four stages: shifting N1 leftmost characters to rightmost in a circular queue or vice versa, converting each of N character so obtained into binary form using 8-bit ASCII code, swapping integral multiples of leftmost N2nd bits with corresponding rightmost bits till 4N bits if remainder of (8N+1)/N2 is zero, otherwise upto 8N bits and finally converting 8N bits so obtained into text using 8-bit ASCII Code.

Find By Topic