Article ID Journal Published Year Pages File Type
488464 Procedia Computer Science 2016 6 Pages PDF
Abstract

With the growth in technology, there is always a need of good encryption method which may provide better security and authenticity with lesser computational complexities. Although there are a lot of symmetric key algorithms which are already been proposed, yet we are going to propose a content based symmetric key algorithm. This algorithm has two rounds and each round uses the ASCII code of characters, round two serves as the heart of this algorithm as XOR operation is performed here. It uses only two operation addition and XOR for encryption process and to generate two sub key, it uses two operation addition and subtraction. The goal of the algorithm is to reduce the correlation between plain text and cipher.

Related Topics
Physical Sciences and Engineering Computer Science Computer Science (General)
Authors
, , ,