Open Access   Article Go Back

A Preliminary Approach to Daily Use Cryptography

Rishav Upadhyay1 , Shibaji Kundu2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-6 , Page no. 14-16, Jun-2015

Online published on Jun 29, 2015

Copyright © Rishav Upadhyay , Shibaji Kundu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rishav Upadhyay , Shibaji Kundu, “A Preliminary Approach to Daily Use Cryptography,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.14-16, 2015.

MLA Style Citation: Rishav Upadhyay , Shibaji Kundu "A Preliminary Approach to Daily Use Cryptography." International Journal of Computer Sciences and Engineering 3.6 (2015): 14-16.

APA Style Citation: Rishav Upadhyay , Shibaji Kundu, (2015). A Preliminary Approach to Daily Use Cryptography. International Journal of Computer Sciences and Engineering, 3(6), 14-16.

BibTex Style Citation:
@article{Upadhyay_2015,
author = {Rishav Upadhyay , Shibaji Kundu},
title = {A Preliminary Approach to Daily Use Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2015},
volume = {3},
Issue = {6},
month = {6},
year = {2015},
issn = {2347-2693},
pages = {14-16},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=541},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=541
TI - A Preliminary Approach to Daily Use Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - Rishav Upadhyay , Shibaji Kundu
PY - 2015
DA - 2015/06/29
PB - IJCSE, Indore, INDIA
SP - 14-16
IS - 6
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2631 2544 downloads 2457 downloads
  
  
           

Abstract

In the modern era of computation security is the most essential matter. Nowadays everyone is concerned about data abstraction. In this paper, a simple yet standard cryptography algorithm has been introduced which can easily be implemented and used by common people. Here, as an introductory approach a text file with some data has been taken and encrypted using a new symmetric key cryptography algorithm and the decryption has been done using the same where each 32 bit from the plain text has been selected and expanded using an Expansion Function and a 64 bit key has been processed and used for the encryption of the expanded plain text. That encrypted text is then shrunk back to 32 bit cipher text. The decryption is done in the same procedure.

Key-Words / Index Term

Plain text, Cipher Text, Key, Shrink Function, Expansion Function, L-Key, R-Key

References

[1] Christof Paar, Jan Pelzl, “Understanding Cryptography: A text book for students and practitioners”, Springer-Verlag Berlin Heidelberg, ISBN: 978-3-642-04100-6, Page No (2-3), (55-83).
[2] David E. Newton, “Encyclopedia of Cryptography”, ABC-CLIO (October 1, 1997), Zero (0th) Edition, ISBN-13: 978-0874367720.