Archives


Rate this Article: (0) Votes

Research Article

Year : 2015 | Volume: 1 | Issue: 1 | Pages: 1-10

An Algorithm for Encrypting/Decrypting Textual Messages

R Rajaram1*, S Umamaheswaran, K Senthil.2

http://dx.doi.org/doi:10.18831/djcse.in/12015011001

Corresponding author

R Rajaram*

Department of Computer Science and Engineering, Vickram College of Engineering, Enathi, 630561, Tamil Nadu, India.

  • 1. Department of Computer Science and Engineering, Vickram College of Engineering, Enathi, 630561, Tamil Nadu, India.
  • 2. 0

Received on: 2015/08/20

Revised on: 2015/09/15

Accepted on: 2015/10/08

Published on: 2015/10/12

  • An Algorithm for Encrypting/Decrypting Textual Messages, R Rajaram, S Umamaheswaran, K Senthil., 2015/10/12, Journal of Excellence in Computer Science and Engineering, 1(1), 1-10, http://dx.doi.org/10.18831/djcse.in/12015011001.

    Published on: 2015/10/12

Abstract

This paper evolves an algorithm for encrypting and decrypting textual messages for transmission over an unsecured channel. The algorithm is based on the selection of a prime integer depending upon the size of the message. Then all its 'generators' or primitive roots are identified. The primitive roots are used for generating the elements for calculating the keys. Key generation  follows a particular strategy, on a pre-arranged manner. The message constituting the alpha-numeric string of characters is permuted by 1-level railway fence. The cipher text is determined by XORing the ASCII decimal value of the message character with its corresponding key, expressed in ASCII decimal. Selected bits of the cipher text, are flipped. The enciphered text is then transmitted to the receiver. The prime integer and the primitive roots needed for key generation are transmitted to the receiver in a separate message. Upon receiving the cipher-text and the key generation parameters, the receiver reverses the whole sequence of operations to recover the plain-text. The algorithm scrambles the  message during transmission through unsecured channels, and also  safeguards data stored in the cloud. Applying 3 strategies for encryption/decryption is attempted for the first time and hence no comparison is attempted with prior works with regard to efficiency or versatility. Flipping bits on the date is the new concept introduced here.

Keywords

Prime integer, Primitive root, Discrete logarithm, Key, ASCII.