A Cryptographic Algorithm Based on ASCII and Number System Conversions along with a Cyclic Mathematical Function

M. Moon, Md. Palash Uddin, M. I. Afjal, Md. Al Mamun, Md Abu Marjan, Mahjabin Nitu
{"title":"A Cryptographic Algorithm Based on ASCII and Number System Conversions along with a Cyclic Mathematical Function","authors":"M. Moon, Md. Palash Uddin, M. I. Afjal, Md. Al Mamun, Md Abu Marjan, Mahjabin Nitu","doi":"10.1109/IC4ME247184.2019.9036706","DOIUrl":null,"url":null,"abstract":"Data encryption and decryption in an efficient manner are the challenging aspects of modern information theory. An efficient cryptology algorithm is introduced in this paper to offer comparatively higher security of data. In this algorithm, the plaintext to be encrypted is converted into unprintable characters. For encryption, a competent technique is applied based on ASCII and number system conversions which make this algorithm different from others. In the steps of the algorithm, each character of the plaintext is first converted into its equivalent ASCII (decimal) which is further converted to its equivalent octal and hexadecimal numbers. Then, using some matrix manipulations on the decimal, octal and hexadecimal representation of each character the character is transformed to 5 unprintable characters to form the intermediate cipher text. After that, every unprintable character in the intermediate cipher text is further converted into a different unprintable character using a cyclic mathematical function. Performing three steps of processing, the final encrypted text is produced that gives higher level of security. In this way, as there can have total 32 unprintable characters, it will take much time (for a plaintext of only 4 characters it takes 1.53 years to break down) if the intruders try to decrypt the original message with every probable combination. Though the length of the encrypted message is larger than original message in this proposed algorithm, it offers higher security for the real-time communications.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC4ME247184.2019.9036706","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Data encryption and decryption in an efficient manner are the challenging aspects of modern information theory. An efficient cryptology algorithm is introduced in this paper to offer comparatively higher security of data. In this algorithm, the plaintext to be encrypted is converted into unprintable characters. For encryption, a competent technique is applied based on ASCII and number system conversions which make this algorithm different from others. In the steps of the algorithm, each character of the plaintext is first converted into its equivalent ASCII (decimal) which is further converted to its equivalent octal and hexadecimal numbers. Then, using some matrix manipulations on the decimal, octal and hexadecimal representation of each character the character is transformed to 5 unprintable characters to form the intermediate cipher text. After that, every unprintable character in the intermediate cipher text is further converted into a different unprintable character using a cyclic mathematical function. Performing three steps of processing, the final encrypted text is produced that gives higher level of security. In this way, as there can have total 32 unprintable characters, it will take much time (for a plaintext of only 4 characters it takes 1.53 years to break down) if the intruders try to decrypt the original message with every probable combination. Though the length of the encrypted message is larger than original message in this proposed algorithm, it offers higher security for the real-time communications.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于ASCII和数字系统转换以及循环数学函数的密码算法
如何有效地对数据进行加密和解密是现代信息论研究的难点。本文介绍了一种有效的密码算法,可以提供较高的数据安全性。在这个算法中,要加密的明文被转换成不可打印的字符。在加密方面,采用了一种基于ASCII和数字系统转换的有效技术,使该算法区别于其他算法。在算法的步骤中,明文的每个字符首先转换为其等效的ASCII(十进制),然后再转换为其等效的八进制和十六进制数。然后,对每个字符的十进制、八进制和十六进制表示进行一些矩阵操作,将字符转换为5个不可打印的字符,形成中间密文。之后,使用循环数学函数将中间密文中的每个不可打印字符进一步转换为另一个不可打印字符。经过三个步骤的处理,最终生成的加密文本具有更高的安全性。这样,由于总共可能有32个不可打印的字符,如果入侵者试图用每种可能的组合解密原始消息,将花费很长时间(对于只有4个字符的明文,需要1.53年才能破解)。该算法虽然加密后的消息长度比原始消息长,但为实时通信提供了更高的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Application of Si-NPs Extracted from the Padma River Sand of Rajshahi in Photovoltaic Cells Misadjustment Measurement with Normalized Weighted Noise Covariance based LMS Algorithm Design and Implementation of a Hospital Based Modern Healthcare Monitoring System on Android Platform Design and Simulation of PV Based Harmonic Compensator for Three Phase load Study of nonradiative recombination centers in GaAs:N δ-doped superlattices structures revealed by below-gap excitation light
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1