Logarithmic Formula Generated Seed Based Cryptographic Technique using proposed Alphanumeric Number System and Rubik Rotation Algorithm

The work presents the manner in which the Logarithmic Formula Generated Seed Based Cryptographic Technique [LFGSCT] (de)ciphers the fragmented plain text, maintaining certain modus operandi. The model formulation of the proposed technique has been conceptualized and devised to generate arbitrary seq...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Chowdhury, R., Bose, R., Sengupta, N., De, M.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The work presents the manner in which the Logarithmic Formula Generated Seed Based Cryptographic Technique [LFGSCT] (de)ciphers the fragmented plain text, maintaining certain modus operandi. The model formulation of the proposed technique has been conceptualized and devised to generate arbitrary sequence of characters, in order to engender the seed using the generated logarithmic formula. The impetus following seed generation is encryption of the actual text based on the proposed Alphanumeric Number System [ANS]. Portraying in a nutshell would emphasize that the actual text has been divided into blocks of ten characters, ordered by the proposed number system. After the fragmentation, the encryption technique continues with the use of the generated seed, followed by the proposed Rubik Rotation Algorithm [RRA], and engaged to randomize the encrypted text. The concept fundamentally embodies the crispness of the proposed technique. During the decryption technique, the seed is retrieved from the cipher text, and an effortless backtracking logic is pursued to restore the actual text. The proposed methodology can be used with utmost ease for both encryption and decryption of any text at disposal. The proposed methodology will ensure immense use during encryption of emails, which is enormously important as well as significant in data transfer and network security.
DOI:10.1109/CODIS.2012.6422265