Home   >   CSC-OpenAccess Library   >    Manuscript Information
Simple Encryption/Decryption Application.
Majdi Al-qdah, Lin Yi Hui
Pages - 33 - 40     |    Revised - 15-06-2007     |    Published - 30-06-2007
Volume - 1   Issue - 1    |    Publication Date - June 2007  Table of Contents
MORE INFORMATION
KEYWORDS
Encryption, Decryption, Rotation, XOR
ABSTRACT
This paper presents an Encryption/Decryption application that is able to work with any type of file; for example: image files, data files, documentation files…etc. The method of encryption is simple enough yet powerful enough to fit the needs of students and staff in a small institution. The application uses simple key generation method of random number generation and combination. The final encryption is a binary one performed through rotation of bits and XOR operation applied on each block of data in any file using a symmetric decimal key. The key generation and Encryption are all done by the system itself after clicking the encryption button with transparency to the user. The same encryption key is also used to decrypt the encrypted binary file.
CITED BY (22)  
1 Alimi, I. A., & Aboderin, O. (2015). Enhanced encryption algorithm based on a modified confusion and diffusion scheme. American Journal of Mobile Systems, Applications and Services, 1(1), 20-29.
2 Saqib, Z., Shahid, M. A., & Ashraf, M. U. Encryption and Decryption Using Automata Theory.
3 Gandhi, R. A., & Gosai, A. M. (2015). A Study on Current Scenario of Audio Encryption. International Journal of Computer Applications, 116(7), 13-17.
4 Amounas, f. international journal of engineering sciences & research technology a multi-level approach of elliptic curve cryptosystem for enhanced security of amazigh alphabet using cellular automata.
5 Prasad, M. R. (2015). Improving RGB Data Security with Advance Cryptography Algorithm.
6 Gosai, D. A. M. (2015). International Journal of Computer Applications.
7 Kalidasan, S., & Pandian, P. Available Online through Research Article www. ijptonline. com.
8 Osho, O., Zubair, Y. O., Ojeniyi, J. A., & Osho, L. O. a simple encryption and decryption system.
9 Singh, V., Dhiman, H., & Khatkar, M. (2014). a comprehensive study of time complexity of various encryption algorithms. international journal of advances in engineering & technology, 7(2), 495.
10 Gowraj, N., Avireddy, S., & Prabhu, S. SDI-ON: Secure Digital Images over the Network.
11 Ashik, M. H. M., & Vydehi, M. S. Secure Symmetric Key Algorithm [SSKA] For Information Exchange Using Modulo.
12 Mushtaque, M. A., & Singh, M. K. Feasibility Evaluation of Symmetric Key Encryption Techniques for Wireless Channel and Disk Storage. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2.
13 Gupta, R. K., & Singh, P. (2013). A new way to design and implementation of hybrid crypto system for security of the information in public network. International Journal of Emerging Technology and Advanced Engineering, 3(8), 108-115.
14 Sinha, S. K., Shrivastava, M., & Pandey, K. K. (2013). A New Way of Design and Implementation of Hybrid Encryption to Protect Confidential Information from Malicious Attack in Network. system, 6, 7.
15 Jain, S. A New Approach of Dynamic Encryption using Steganography.
16 Das, D., Lanjewar, U. A., & Sharma, S. J. Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS.
17 Msvs, B. R., Vardhan, V., & Reddy, P. A noval security model for indic scripts-a case study on Telugu. Int. J. Comput. Sci. Secur.(IJCSS), 3(4), 303.
18 Rahman, M. (2012). Any File Encryption by Translating ASCII Value of Characters. International Journal of Advanced Research in Computer Science, 3(2).
19 EL-ARABY, W. S. M. S. (2012). Video Watermarking Implementation Based on fpga (doctoral dissertation, arab academy for science).
20 Masum, M. R. (2012). Any File Encryption by Translating ASCII Value of Characters. International Journal of Advanced Research in Computer Science, 3(2).
21 2. R.Dhanalakshmi and Dr.C.Chellappan , “Secure Email – Ensuring CIA (Confidentiality, Integrity and Authentication) and Privacy for Organizations”, in International Conference on Environment, Economics, Energy, Devices, Systems, Communications, Computers, Mathematics, University Center Drobeta Turnu Severin, Romania, October 27-29, 2011.
22 B. Raju MSVS, V. B Vishnu, G. A. Naidu, R. L. Pratap and B. A Vinaya, “A Noval Security Model for Indic Scripts- A Case Study on Telugu”, International Journal of Computer Science and Security, (IJCSS), 3(4), pp. 303 – 313, 2009.
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 Academic Index 
5 CiteSeerX 
6 refSeek 
7 iSEEK 
8 ResearchGATE 
9 Libsearch 
10 Bielefeld Academic Search Engine (BASE) 
11 Scribd 
12 WorldCat 
13 SlideShare 
14 PDFCAST 
15 PdfSR 
16 Google Books 
Agnew G. B., Mullin R. C., Onyszchuk I. M., and Vqanstone S. A. “An Implementation for a Fast Public-Key Cryptosystems”. Journal of Cryptology, Vol.3, No 2, PP. 63-79. 1995.
Andy Wilson , “Tips and Tricks: XOR Encryption” http://www.andyw.com/director/xor.asp , 1998.
Artur Ekert, Carolina Moura Alves, Ajay Gopinathan, “History of Cryptography”.
Baraka H., El-Manawy H. A., and Attiya A. “An Integrated Model for Internet Security Using Prevention and Detection Techniques”. IEEE Journal of Computer and Communication Vol. 99, PP. 25-33. 1998
Beth T. and Gollmann D. “Algorithm Engineering for Public Key Algorithms”. IEEE Journal on Selected Areas in Communications; Vol. 7, No 4, PP. 458-466. 1989
Cryptomathic, “E-SECURITY DICTIONARY”, http://www.cryptomathic.com/labs/techdict.html , 2003.
Dariusz Stanislawek , “Free Software copyright 1997 - 2006 ” http://members.ozemail.com.au/~nulifetv/freezip/freeware
Freeman J., Neely R., and Megalo L. “Developing Secure Systems: Issues and Solutions”. IEEE Journal of Computer and Communication, Vol. 89, PP. 36-45. 1998
IBM. “The Data Encryption Standard (DES) and its strength against attacks”. IBM Journal of Research and Development, Vol. 38, PP. 243-250. 1994
Microsoft, "Encrypting File System for Windows 2000", http://www.microsoft.com/windows2000/techinfo/howitworks/security/encrypt.asp, 1998.
NeoCrypt, “NeoCrypt File Protection Utility” , http://sourceforge.net/projects/neocrypt
Vivek Thakur , “NeekProtect”, http://neekprotect.sourceforge.net , 2006.
Wikipedia , “Bitwise operation” , http://en.wikipedia.org/wiki/Bitwise_operation , last modified on10 December 2006.
Wikipedia, “Encryption”, http://en.wikipedia.org/wiki/Encryption, modified on 13 December 2006.
Dr. Majdi Al-qdah
- Malaysia
majdi.qdah@mmu.edu.my
Mr. Lin Yi Hui
Faculty of Information Technology - Malaysia


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS