A Cryptographic Algorithm Based on ASCII and Number System Conversions along with a Cyclic Mathematical Function

M. Moon, Md. Palash Uddin, M. I. Afjal, Md. Al Mamun, Md Abu Marjan, Mahjabin Nitu
{"title":"A Cryptographic Algorithm Based on ASCII and Number System Conversions along with a Cyclic Mathematical Function","authors":"M. Moon, Md. Palash Uddin, M. I. Afjal, Md. Al Mamun, Md Abu Marjan, Mahjabin Nitu","doi":"10.1109/IC4ME247184.2019.9036706","DOIUrl":null,"url":null,"abstract":"Data encryption and decryption in an efficient manner are the challenging aspects of modern information theory. An efficient cryptology algorithm is introduced in this paper to offer comparatively higher security of data. In this algorithm, the plaintext to be encrypted is converted into unprintable characters. For encryption, a competent technique is applied based on ASCII and number system conversions which make this algorithm different from others. In the steps of the algorithm, each character of the plaintext is first converted into its equivalent ASCII (decimal) which is further converted to its equivalent octal and hexadecimal numbers. Then, using some matrix manipulations on the decimal, octal and hexadecimal representation of each character the character is transformed to 5 unprintable characters to form the intermediate cipher text. After that, every unprintable character in the intermediate cipher text is further converted into a different unprintable character using a cyclic mathematical function. Performing three steps of processing, the final encrypted text is produced that gives higher level of security. In this way, as there can have total 32 unprintable characters, it will take much time (for a plaintext of only 4 characters it takes 1.53 years to break down) if the intruders try to decrypt the original message with every probable combination. Though the length of the encrypted message is larger than original message in this proposed algorithm, it offers higher security for the real-time communications.","PeriodicalId":368690,"journal":{"name":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC4ME247184.2019.9036706","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Data encryption and decryption in an efficient manner are the challenging aspects of modern information theory. An efficient cryptology algorithm is introduced in this paper to offer comparatively higher security of data. In this algorithm, the plaintext to be encrypted is converted into unprintable characters. For encryption, a competent technique is applied based on ASCII and number system conversions which make this algorithm different from others. In the steps of the algorithm, each character of the plaintext is first converted into its equivalent ASCII (decimal) which is further converted to its equivalent octal and hexadecimal numbers. Then, using some matrix manipulations on the decimal, octal and hexadecimal representation of each character the character is transformed to 5 unprintable characters to form the intermediate cipher text. After that, every unprintable character in the intermediate cipher text is further converted into a different unprintable character using a cyclic mathematical function. Performing three steps of processing, the final encrypted text is produced that gives higher level of security. In this way, as there can have total 32 unprintable characters, it will take much time (for a plaintext of only 4 characters it takes 1.53 years to break down) if the intruders try to decrypt the original message with every probable combination. Though the length of the encrypted message is larger than original message in this proposed algorithm, it offers higher security for the real-time communications.
一种基于ASCII和数字系统转换以及循环数学函数的密码算法
如何有效地对数据进行加密和解密是现代信息论研究的难点。本文介绍了一种有效的密码算法,可以提供较高的数据安全性。在这个算法中,要加密的明文被转换成不可打印的字符。在加密方面,采用了一种基于ASCII和数字系统转换的有效技术,使该算法区别于其他算法。在算法的步骤中,明文的每个字符首先转换为其等效的ASCII(十进制),然后再转换为其等效的八进制和十六进制数。然后,对每个字符的十进制、八进制和十六进制表示进行一些矩阵操作,将字符转换为5个不可打印的字符,形成中间密文。之后,使用循环数学函数将中间密文中的每个不可打印字符进一步转换为另一个不可打印字符。经过三个步骤的处理,最终生成的加密文本具有更高的安全性。这样,由于总共可能有32个不可打印的字符,如果入侵者试图用每种可能的组合解密原始消息,将花费很长时间(对于只有4个字符的明文,需要1.53年才能破解)。该算法虽然加密后的消息长度比原始消息长,但为实时通信提供了更高的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信