Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(73.82KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Simple Encryption/Decryption Application.
Majdi Al-qdah, Lin Yi Hui
Pages - 33 - 40     |    Revised - 15-06-2007     |    Published - 30-06-2007
Volume - 1   Issue - 1    |    Publication Date - June 2007  Table of Contents
MORE INFORMATION
KEYWORDS
Encryption, Decryption, Rotation, XOR
ABSTRACT
This paper presents an Encryption/Decryption application that is able to work with any type of file; for example: image files, data files, documentation files…etc. The method of encryption is simple enough yet powerful enough to fit the needs of students and staff in a small institution. The application uses simple key generation method of random number generation and combination. The final encryption is a binary one performed through rotation of bits and XOR operation applied on each block of data in any file using a symmetric decimal key. The key generation and Encryption are all done by the system itself after clicking the encryption button with transparency to the user. The same encryption key is also used to decrypt the encrypted binary file.
CITED BY (22)  
1 Alimi, I. A., & Aboderin, O. (2015). Enhanced encryption algorithm based on a modified confusion and diffusion scheme. American Journal of Mobile Systems, Applications and Services, 1(1), 20-29.
2 Saqib, Z., Shahid, M. A., & Ashraf, M. U. Encryption and Decryption Using Automata Theory.
3 Gandhi, R. A., & Gosai, A. M. (2015). A Study on Current Scenario of Audio Encryption. International Journal of Computer Applications, 116(7), 13-17.
4 Amounas, f. international journal of engineering sciences & research technology a multi-level approach of elliptic curve cryptosystem for enhanced security of amazigh alphabet using cellular automata.
5 Prasad, M. R. (2015). Improving RGB Data Security with Advance Cryptography Algorithm.
6 Gosai, D. A. M. (2015). International Journal of Computer Applications.
7 Kalidasan, S., & Pandian, P. Available Online through Research Article www. ijptonline. com.
8 Osho, O., Zubair, Y. O., Ojeniyi, J. A., & Osho, L. O. a simple encryption and decryption system.
9 Singh, V., Dhiman, H., & Khatkar, M. (2014). a comprehensive study of time complexity of various encryption algorithms. international journal of advances in engineering & technology, 7(2), 495.
10 Gowraj, N., Avireddy, S., & Prabhu, S. SDI-ON: Secure Digital Images over the Network.
11 Ashik, M. H. M., & Vydehi, M. S. Secure Symmetric Key Algorithm [SSKA] For Information Exchange Using Modulo.
12 Mushtaque, M. A., & Singh, M. K. Feasibility Evaluation of Symmetric Key Encryption Techniques for Wireless Channel and Disk Storage. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2.
13 Gupta, R. K., & Singh, P. (2013). A new way to design and implementation of hybrid crypto system for security of the information in public network. International Journal of Emerging Technology and Advanced Engineering, 3(8), 108-115.
14 Sinha, S. K., Shrivastava, M., & Pandey, K. K. (2013). A New Way of Design and Implementation of Hybrid Encryption to Protect Confidential Information from Malicious Attack in Network. system, 6, 7.
15 Jain, S. A New Approach of Dynamic Encryption using Steganography.
16 Das, D., Lanjewar, U. A., & Sharma, S. J. Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS.
17 Msvs, B. R., Vardhan, V., & Reddy, P. A noval security model for indic scripts-a case study on Telugu. Int. J. Comput. Sci. Secur.(IJCSS), 3(4), 303.
18 Rahman, M. (2012). Any File Encryption by Translating ASCII Value of Characters. International Journal of Advanced Research in Computer Science, 3(2).
19 EL-ARABY, W. S. M. S. (2012). Video Watermarking Implementation Based on fpga (doctoral dissertation, arab academy for science).
20 Masum, M. R. (2012). Any File Encryption by Translating ASCII Value of Characters. International Journal of Advanced Research in Computer Science, 3(2).
21 2. R.Dhanalakshmi and Dr.C.Chellappan , Secure Email Ensuring CIA (Confidentiality, Integrity and Authentication) and Privacy for Organizations, in International Conference on Environment, Economics, Energy, Devices, Systems, Communications, Computers, Mathematics, University Center Drobeta Turnu Severin, Romania, October 27-29, 2011.
22 B. Raju MSVS, V. B Vishnu, G. A. Naidu, R. L. Pratap and B. A Vinaya, A Noval Security Model for Indic Scripts- A Case Study on Telugu, International Journal of Computer Science and Security, (IJCSS), 3(4), pp. 303 313, 2009.
1 Google Scholar
2 Academic Journals Database
3 ScientificCommons
4 Academic Index
5 CiteSeerX
6 refSeek
7 iSEEK
8 ResearchGATE
9 Libsearch
10 Bielefeld Academic Search Engine (BASE)
11 Scribd
12 WorldCat
13 SlideShare
14 PDFCAST
15 PdfSR
16 Google Books
1 Wikipedia, Encryption, http://en.wikipedia.org/wiki/Encryption, modified on 13 December 2006.
2 Freeman J., Neely R., and Megalo L. Developing Secure Systems: Issues and Solutions. IEEE Journal of Computer and Communication, Vol. 89, PP. 36-45. 1998
3 Agnew G. B., Mullin R. C., Onyszchuk I. M., and Vqanstone S. A. An Implementation for a Fast Public-Key Cryptosystems. Journal of Cryptology, Vol.3, No 2, PP. 63-79. 1995.
4 Beth T. and Gollmann D. Algorithm Engineering for Public Key Algorithms. IEEE Journal on Selected Areas in Communications; Vol. 7, No 4, PP. 458-466. 1989
5 IBM. The Data Encryption Standard (DES) and its strength against attacks. IBM Journal of Research and Development, Vol. 38, PP. 243-250. 1994
6 Wikipedia , Bitwise operation , http://en.wikipedia.org/wiki/Bitwise_operation , last modified on10 December 2006.
7 Andy Wilson , Tips and Tricks: XOR Encryption http://www.andyw.com/director/xor.asp , 1998.
8 Baraka H., El-Manawy H. A., and Attiya A. An Integrated Model for Internet Security Using Prevention and Detection Techniques. IEEE Journal of Computer and Communication Vol. 99, PP. 25-33. 1998
9 Microsoft, "Encrypting File System for Windows 2000", http://www.microsoft.com/windows2000/techinfo/howitworks/security/encrypt.asp, 1998.
10 Dariusz Stanislawek , Free Software copyright 1997 - 2006 http://members.ozemail.com.au/~nulifetv/freezip/freeware
11 NeoCrypt, NeoCrypt File Protection Utility , http://sourceforge.net/projects/neocrypt
12 Vivek Thakur , NeekProtect, http://neekprotect.sourceforge.net , 2006.
13 Artur Ekert, Carolina Moura Alves, Ajay Gopinathan, History of Cryptography.
14 Cryptomathic, E-SECURITY DICTIONARY, http://www.cryptomathic.com/labs/techdict.html , 2003.
Dr. Majdi Al-qdah
- Malaysia
majdi.qdah@mmu.edu.my
Mr. Lin Yi Hui
Faculty of Information Technology - Malaysia