Cryptography Technique for a Novel Text Using Mathematical Functions

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 381)

Abstract

The encryption/decryption process is applied to text to provide security. In this work, I propose a novel method to perform encryption and decryption. In this process, one text is taken. Text is divided into set of three components, together with a private key. I built a content-addressable memory (CAM). This represents the encrypted text. The decryption process will do it in a reverse way. The benefit of the proposed model is that the plaintext and ciphertext will not be in the same dimension and the ciphertext was also represented in image format. The entire process uses a secret key for the process of encryption.

Keywords

Text encryption Associative memory Mathematical functions 

References

  1. 1.
    Mandrel, A.: Introduction to Cryptography with open-source software. CRC Press, pp. 4–5 (2011)Google Scholar
  2. 2.
    Ayesha: A symmetric key cryptographic algorithm. IJCSE (0975–8887) 1(15) (2010)Google Scholar
  3. 3.
    Solanki, K.H., Patel, C.R.: New symmetric key cryptographic algorithm for enhancing security of data (IJRCSEE) 1(3) (2012)Google Scholar
  4. 4.
    Mathur, A.: A research paper: an ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms (IJCSE) 4(9), 1650–1657 (2012)Google Scholar
  5. 5.
    Kiran Kumar, M., Rasool, S., Mukthyar Azam, S.: Efficient digital encryption algorithm based on matrix scrambling technique. Int. J. Netw. Secur. Its Appl. (IJNSA) 2(4), 30–41 (2010)Google Scholar
  6. 6.
    Ramesh, G., Umarani, R.: A novel symmetrical encryption algorithm with high security based on key updating. IJCEA 2(5), 329–341 (2011)Google Scholar

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringAnil Neerukonda Institute of Technology and SciencesVisakhapatnamIndia

Personalised recommendations