M. Moon, Md. Palash Uddin, M. I. Afjal, Md. Al Mamun, Md Abu Marjan, Mahjabin Nitu
{"title":"A Cryptographic Algorithm Based on ASCII and Number System Conversions along with a Cyclic Mathematical Function","authors":"M. Moon, Md. Palash Uddin, M. I. Afjal, Md. Al Mamun, Md Abu Marjan, Mahjabin Nitu","doi":"10.1109/IC4ME247184.2019.9036706","DOIUrl":null,"url":null,"abstract":"Data encryption and decryption in an efficient manner are the challenging aspects of modern information theory. An efficient cryptology algorithm is introduced in this paper to offer comparatively higher security of data. In this algorithm, the plaintext to be encrypted is converted into unprintable characters. For encryption, a competent technique is applied based on ASCII and number system conversions which make this algorithm different from others. In the steps of the algorithm, each character of the plaintext is first converted into its equivalent ASCII (decimal) which is further converted to its equivalent octal and hexadecimal numbers. Then, using some matrix manipulations on the decimal, octal and hexadecimal representation of each character the character is transformed to 5 unprintable characters to form the intermediate cipher text. After that, every unprintable character in the intermediate cipher text is further converted into a different unprintable character using a cyclic mathematical function. Performing three steps of processing, the final encrypted text is produced that gives higher level of security. In this way, as there can have total 32 unprintable characters, it will take much time (for a plaintext of only 4 characters it takes 1.53 years to break down) if the intruders try to decrypt the original message with every probable combination. Though the length of the encrypted message is larger than original message in this proposed algorithm, it offers higher security for the real-time communications.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC4ME247184.2019.9036706","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Data encryption and decryption in an efficient manner are the challenging aspects of modern information theory. An efficient cryptology algorithm is introduced in this paper to offer comparatively higher security of data. In this algorithm, the plaintext to be encrypted is converted into unprintable characters. For encryption, a competent technique is applied based on ASCII and number system conversions which make this algorithm different from others. In the steps of the algorithm, each character of the plaintext is first converted into its equivalent ASCII (decimal) which is further converted to its equivalent octal and hexadecimal numbers. Then, using some matrix manipulations on the decimal, octal and hexadecimal representation of each character the character is transformed to 5 unprintable characters to form the intermediate cipher text. After that, every unprintable character in the intermediate cipher text is further converted into a different unprintable character using a cyclic mathematical function. Performing three steps of processing, the final encrypted text is produced that gives higher level of security. In this way, as there can have total 32 unprintable characters, it will take much time (for a plaintext of only 4 characters it takes 1.53 years to break down) if the intruders try to decrypt the original message with every probable combination. Though the length of the encrypted message is larger than original message in this proposed algorithm, it offers higher security for the real-time communications.