Text encryption and decryption with extended euclidean algorithm and combining the features of linear congruence generator

  • strict warning: Non-static method view::load() should not be called statically in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/views.module on line 906.
  • strict warning: Declaration of views_handler_argument::init() should be compatible with views_handler::init(&$view, $options) in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/handlers/views_handler_argument.inc on line 744.
  • strict warning: Declaration of views_handler_filter::options_validate() should be compatible with views_handler::options_validate($form, &$form_state) in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/handlers/views_handler_filter.inc on line 607.
  • strict warning: Declaration of views_handler_filter::options_submit() should be compatible with views_handler::options_submit($form, &$form_state) in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/handlers/views_handler_filter.inc on line 607.
  • strict warning: Declaration of views_handler_filter_boolean_operator::value_validate() should be compatible with views_handler_filter::value_validate($form, &$form_state) in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/handlers/views_handler_filter_boolean_operator.inc on line 159.
  • strict warning: Non-static method view::load() should not be called statically in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/views.module on line 906.
  • strict warning: Non-static method view::load() should not be called statically in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/views.module on line 906.
Author: 
Solanki Pattanayak and Dipankar Dey
Abstract: 

Security plays a vital role in our communication system through internet. For this reasons, we protect data from unauthorized users using appropriate encryptions algorithm. Using encryption we convert plain text to cipher text using our proposed secret key and similarly using inverse key we can decrypt the original text. In this algorithm, we read a string, then extract each of the single characters from the string and convert these characters to ASCII equivalent value. Apply proposed secret key, along with ASCII value and appropriate encryption algorithm we encrypt the text. Similarly, using the inverse key along with appropriate decryption algorithm we can decrypt the original text.

Download PDF: 

CHIEF EDITOR

  

           Prof. Dr. Bilal BİLGİN

Call for Papers - 2017

    submit your paper now

   Vol. 07, Issue 03, March 2017

CURRENT ISSUE

 

Article Tracking

IMPACT FACTOR 2016

          4.753

Get your Certificate

Copyright © 2016 International Journal Development Research. All Rights Reserved.