Network Security Using Double Symmetric Key: Algorithm SKG 2.3

In this paper, named algorithm SKG 2.3, the author has used double symmetric key for network security. For encryption and decryption of any text file, the symmetric keys are used at four stages: shifting N1 leftmost characters to rightmost in a circular queue or vice versa, converting each of N character so obtained into binary form using 8-bit ASCII code, swapping integral multiples of leftmost N2nd bits with corresponding rightmost bits till 4N bits if remainder of (8N+1)/N2 is zero, otherwise upto 8N bits and finally converting 8N bits so obtained into text using 8-bit ASCII Code.

Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) Topic: Security Date Added: Oct 2014 Format: PDF

Find By Topic