Abstract

Most of the encryption algorithms used today generates huge cipher messages as well as long encryption keys. These approaches require time and are computationally intensive .While sending data packets through the network a compression technique along with cryptography can be applied to reduce the data packet size for better bandwidth utilization and hence faster transmission of data. In this study we propose a new encryption technique which will encrypt data into reduced size cipher text while keeping the check on size of key. The algorithm was first introduced in an earlier paper. In this study we modified algorithm to preprocess text as well as numeric data.

Highlights

  • In the digital world with the widespread use of information technologies and the rise of digital computer networks in many areas of the world, securing the exchange of information has become a crucial task (McConnell, 2002)

  • Cryptography is the methods that allow information to be sent in a secure form in such a way that the only receiver able to retrieve this information

  • Level of protection is varied for every situation and depends on the encryption technique used for coding

Read more

Summary

Introduction

In the digital world with the widespread use of information technologies and the rise of digital computer networks in many areas of the world, securing the exchange of information has become a crucial task (McConnell, 2002). Cryptography is the methods that allow information to be sent in a secure form in such a way that the only receiver able to retrieve this information. Modern cryptography involves the use of keys for data signing, encoding and decoding. Level of protection is varied for every situation and depends on the encryption technique used for coding. One way to estimate techniques on this level is to estimate how much CPU time would be required on a machine of a given processing speed to iterate through all possible keys to the encoded data based upon the permutation and second is how much secure the data is while transmitting. The basic goal of our work is along with these two measures cryptography algorithm must be efficient in reducing the size of encrypted text referred as cipher text. In this study we are modifying the cryptographic technique to provide better results

Proposed Technique
Primary Dictionary
Secondary Dictionary
Encryption Algorithm
Write the code in the output file else
Flowchart for the Algorithm is as Follows
Funding Information
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call