{"title":"Boolean Algebra based effective and efficient asymmetric key cryptography algorithm: BAC algorithm","authors":"N. Kumar, Pankaj Gupta, M. Sahu, M. A. Rizvi","doi":"10.1109/IMAC4S.2013.6526417","DOIUrl":null,"url":null,"abstract":"The Internet was born of academic efforts to share information; it never strove for high security measures. It plays important role in becoming people online, this mode is easy and effective but dangerous too in terms of data hacking and cracking by unauthorized persons. It is needed that while using Internet data must be secured and personal. Encryption can be used to protect data in transit, for example data being transferred via network (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks. Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication codes (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. In this paper an attempt is made to develop new encryption and decryption algorithm and implemented in Java, it gives very encouraging results in small as well as in large data files.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMAC4S.2013.6526417","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
The Internet was born of academic efforts to share information; it never strove for high security measures. It plays important role in becoming people online, this mode is easy and effective but dangerous too in terms of data hacking and cracking by unauthorized persons. It is needed that while using Internet data must be secured and personal. Encryption can be used to protect data in transit, for example data being transferred via network (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks. Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication codes (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. In this paper an attempt is made to develop new encryption and decryption algorithm and implemented in Java, it gives very encouraging results in small as well as in large data files.