Abstract

Information security involves safeguarding sensitive data and IT networks from unauthorized access and cyber-attacks. To address this need, various techniques and algorithms have been introduced. In this context, we propose a new technique aimed at protecting information from diverse threats, enhancing user confidentiality, and ensuring high data integrity and availability. In this paper, we introduce a method for generating cipher text by performing multiple rounds of operations. In the first round, we convert the plaintext into ASCII code, then into hexadecimal, and subsequently reverse the code. These transformed values are then stored in blocks, where various operations are performed to generate the cipher text. Keywords: Cryptography, Security, Encryption, Decryption, Key size.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.