{"title":"提出了用于数据安全的对称密钥加密算法","authors":"A. Anand, A. Raj, Rashi Kohli, Vimal Bibhu","doi":"10.1109/ICICCS.2016.7542294","DOIUrl":null,"url":null,"abstract":"In the race towards the pinnacle of evolution and development, few things have come out on top and become the crucial weapon or path towards success. Information is one such thing. With the increased importance & plausible struggles over the accumulation of information to secure dominance & success, the concept of Information Security has emerged. Information Security is the process of protecting the information from unauthorized access and/or damage or misuse. Cryptography techniques are used for the purpose of making the exchange of information secure and confidential. It converts the sensitive information into a form which can't be understood by the unintended individuals. In this paper, we have tried to come up with a new algorithm which can be put to use for cryptographic purposes. The proposed algorithm is simple yet robust and will prove hard to crack unless one is not familiar with its inner workings.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"21","resultStr":"{\"title\":\"Proposed symmetric key cryptography algorithm for data security\",\"authors\":\"A. Anand, A. Raj, Rashi Kohli, Vimal Bibhu\",\"doi\":\"10.1109/ICICCS.2016.7542294\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the race towards the pinnacle of evolution and development, few things have come out on top and become the crucial weapon or path towards success. Information is one such thing. With the increased importance & plausible struggles over the accumulation of information to secure dominance & success, the concept of Information Security has emerged. Information Security is the process of protecting the information from unauthorized access and/or damage or misuse. Cryptography techniques are used for the purpose of making the exchange of information secure and confidential. It converts the sensitive information into a form which can't be understood by the unintended individuals. In this paper, we have tried to come up with a new algorithm which can be put to use for cryptographic purposes. The proposed algorithm is simple yet robust and will prove hard to crack unless one is not familiar with its inner workings.\",\"PeriodicalId\":389065,\"journal\":{\"name\":\"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"21\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICCS.2016.7542294\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICCS.2016.7542294","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Proposed symmetric key cryptography algorithm for data security
In the race towards the pinnacle of evolution and development, few things have come out on top and become the crucial weapon or path towards success. Information is one such thing. With the increased importance & plausible struggles over the accumulation of information to secure dominance & success, the concept of Information Security has emerged. Information Security is the process of protecting the information from unauthorized access and/or damage or misuse. Cryptography techniques are used for the purpose of making the exchange of information secure and confidential. It converts the sensitive information into a form which can't be understood by the unintended individuals. In this paper, we have tried to come up with a new algorithm which can be put to use for cryptographic purposes. The proposed algorithm is simple yet robust and will prove hard to crack unless one is not familiar with its inner workings.