Algebra Based Encryption and Decryption Algorithms
link and bank account details. The specialty of the algorithm is that it can be ﬂexibly used to encrypt and decrypt the secret messages containing not only English alphabets but also those messages containing the numbers, punctuations, elementary mathematics operations and the special characters. The performance of the algorithm is evaluated in terms of computational time, memory usage. From the analysis it is found that the proposed algorithm is faster in terms of execution time as compared to the modern algorithm which makes the algorithm computationally
secure. The proposed research particularly contributes as the addition of knowledge in the ﬁeld of cryptography and generally to the information security; consequently can be beneﬁcial to the society.
Sharma, S.J., The Art of Cryptography: From Ancient Number System to Strange Number System. International Journal of Application or Innovation in Engineering and management (IJAIEM), ISSN, pp.23194847.
Wasnik, T.P., Patil, V.S., Patinge, S.A., Dave, S.R. and Sayasikamal, G.J., 2013. Cryptography as an instrument to network security||. International Journal of Application or Innovation in Engineering Management (IJAIEM), 2(3), pp.72-80.
Al-Vahed, A. and Sahhavi, H., 2011. An overview of modern cryptography. World Applied Programming, 1(1), pp.55-61.
Ritu Tripathi, and Sanjay Agrawal., (2014). Comparative Study of Symmetric and Asymmetric Cryptography Techniques International Journal of Advance Foundation and Research in Computer (IJAFRC), 1(6), pp. 68-76.
Alam, M.I. and Khan, M.R., 2013. Performance and eﬃciency analysis of different block cipher algorithms of symmetric key cryptography. International Journal of Advanced Research in Computer Science and Software Engineering, 3(10), pp.713-720.
Suguna, S., Dhanakoti, V. and Manjupriya, R., 2016. A study on symmetric and asymmetric key encryption algorithms. Int Res J Eng Technol (IRJET), 3(4), pp.27-31.
Kumari, S., 2017. A research paper on cryptography encryption and compression techniques. International Journal Of Engineering And Computer Science, 6(4), pp.20915-20919.
AbuTaha, M., Farajallah, M., Tahboub, R. and Odeh, M., 2011. Survey paper: cryptography is the science of information security.
Thambiraja, E., Ramesh, G. and Umarani, D.R., 2012. A survey on various most common encryption techniques. International journal of advanced research in computer science and software engineering, 2(7).
Poonia, P. and Kantha, P., 2016. Comparative Study of Various Substitution and Transposition Encryption Techniques. Int. J. Comput. Appl, 145(10), pp.24-27.
Kenang Eko Prasetyol, Tito Waluyo Purboyo, and Randy Erfa Saputra,(2017). A Survey on Data Comparison and Cryptography Algorithms International Journal of Applied Engineering Research (IJAER), 12(23), pp. 13589-13595.
Shyam Nandan Kumar. Review on Network Security and Cryptography International Transaction of Electrical and Computer Engineers System (ITECE), Vol. 3, No. 1, ISSN (Online) 2373-1281 and ISSN (Print) 2373- 1273, (2015) pp.1-11.
Saranya, K., Mohanapriya, R. and Udhayan, J., 2014. A review on symmetric key encryption techniques in cryptography. International Journal of Science, Engineering and Technology Research (IJSETR), 3(3), pp.539-544.
Mohan, M., Devi, M.K. and Prakash, V.J., 2015. Security analysis and modiﬁcation of classical encryption scheme. Indian journal of science and technology, 8(8), pp.542-548.
Kendhe, A.K. and Agrawal, H., 2013. A survey report on various cryptanalysis techniques. International Journal of Soft Computing and Engineering (IJSCE), 3(2), pp.287-293.
Dave, K.T., 2013. Brute-force Attack ‘Seeking but Distressing’. Int. J. Innov. Eng. Technol. Brute-force, 2(3), pp.75-78.
Mandal, P.C., 2012. Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowﬁsh. Journal of Global Research in Computer Science, 3(8), pp.67-70.
Mahajan, P. and Sachdeva, A., 2013. A study of encryption algorithms AES, DES and RSA for security. Global Journal of Computer Science and Technology.
Masram, R., Shahare, V., Abraham, J. and Moona, R., 2014. Analysis and comparison of symmetric key cryptographic algorithms based on various ﬁle features. International Journal of Network Security Its Applications, 6(4), p.43.
Rusia, M.K. and Rusia, M., 2017. A literature survey on eﬃciency and security of symmetric cryptography. Intern. J. of Comp. Sci. and Network, 6(3), pp.425-429.
Mathur, H., 2015. Prof. Zahid Alam,” Analysis In Symmetric And Asymmetric Cryptology Algorithm”. International Journal of Emerging Trends Technology in Computer Science, 4(1), pp.44-47.
Karthik, S. and Muruganandam, A., 2014. Data Encryption and Decryption by using Triple DES and performance analysis of crypto system. International Journal of Scientiﬁc Engineering and Research, 2(11),
Zoran Herigonja, 2016. Comparative Analysis of Cryptographic Algorithms International Journal of
Digital Technology and Economy (IJDTE),1(2), pp. 127-134.
More, S., 2015. Implementation of AES with Time Complexity Measurement for Various Input.
Global Journal of Computer Science and Technology, 15(E4), pp.11-20.
B.Bharathi, G.Manivasagam, and M. Anand Kumar, 2017. Metrics for Performance Evaluation of Encryption
Algorithms International Journal of Advance Research in Science and Engineering (IJARSE),6(3)pp.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.