{"title":"凯撒密码和异或加密技术在安全无线通信中的实现","authors":"Lim Chong Han, N. Mahyuddin","doi":"10.1109/ICED.2014.7015781","DOIUrl":null,"url":null,"abstract":"Due to the openness of the wireless communication, security aspect of data transmission plays important role in respect to the effective measure of the transmission, where cryptography method is often implemented to sustain the security of the communication. A secure communication program is proposed in this paper which involves three design stages, i.e. the encryption technique, serial-transmission and encoding technique. The encryption technique adopts a combination of Caesar Cipher and XOR encryptions, and programmed using C++. Subsequently, few possible cases have been tested to verify the strength of the security program, which indicates an improvement in security of data transmission in wireless medium without affecting the processing time.","PeriodicalId":143806,"journal":{"name":"2014 2nd International Conference on Electronic Design (ICED)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"An implementation of caesar cipher and XOR encryption technique in a secure wireless communication\",\"authors\":\"Lim Chong Han, N. Mahyuddin\",\"doi\":\"10.1109/ICED.2014.7015781\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the openness of the wireless communication, security aspect of data transmission plays important role in respect to the effective measure of the transmission, where cryptography method is often implemented to sustain the security of the communication. A secure communication program is proposed in this paper which involves three design stages, i.e. the encryption technique, serial-transmission and encoding technique. The encryption technique adopts a combination of Caesar Cipher and XOR encryptions, and programmed using C++. Subsequently, few possible cases have been tested to verify the strength of the security program, which indicates an improvement in security of data transmission in wireless medium without affecting the processing time.\",\"PeriodicalId\":143806,\"journal\":{\"name\":\"2014 2nd International Conference on Electronic Design (ICED)\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 2nd International Conference on Electronic Design (ICED)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICED.2014.7015781\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 2nd International Conference on Electronic Design (ICED)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICED.2014.7015781","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An implementation of caesar cipher and XOR encryption technique in a secure wireless communication
Due to the openness of the wireless communication, security aspect of data transmission plays important role in respect to the effective measure of the transmission, where cryptography method is often implemented to sustain the security of the communication. A secure communication program is proposed in this paper which involves three design stages, i.e. the encryption technique, serial-transmission and encoding technique. The encryption technique adopts a combination of Caesar Cipher and XOR encryptions, and programmed using C++. Subsequently, few possible cases have been tested to verify the strength of the security program, which indicates an improvement in security of data transmission in wireless medium without affecting the processing time.