IEEE PROJECT TOPICS & ABSTRACTS BY SOFTRONIICS
SOFTONIICS WWW.SOFTRONIICS.IN
CALICUT||PALAKKAD||COIMBATORE 9037061113||9037291113
ASCII Based Text Encryption and Decryption
With Check For Data Integrity
Abstract:
Data security is of high concern when it comes to data-transfer over the network. With increased attacks
on the ciphertexts, the need to improve the ciphers has increased. Not only the data but also the key
used for the cryptographic process needs to be secured as all the operations needed to retransform the
ciphertext back to original plaintext depend on that key. These needs have led to many new algorithms
for encryption as well as for key transfer mechanisms. In this paper, a method is proposed for improving
encryption using various mathematical and logical operations and providing a check for data integrity.
Cryptography means writing or study of codes. It involves various techniques used to scramble the
plaintext and then unscramble it to plain original form. Two most prominent
encryption methods are Symmetric Encryption and Asymmetric Encryption. Encryption techniques
involve use of various mathematical as well as logical functions used to make the text unreadable.
Decryption usually involves reverse of encryption operations to obtain the
original plaintext.
1.Asymmetric Encryption –
This method makes use of two different keys. One key is used for encrypting the data and another is
used for decrypting the data. Any one key from the pair can be used for encryption and the other for
decryption.
2.Symmetric Encryption –
This method makes use of a single key. Client and server both agree upon a key using techniques like
DiffieHellman algorithm and then the communication proceeds using that key. Unlike asymmetric
encryption, in this method, decryption can be done only with the key which is used for encrypting the
data.
3.One Time Pad –
One Time Pad, also known as OTP, is a collection of randomly generated characters which is also the
only cipher known to be mathematically unbreakable. Use of OTP in any cipher techniques can help
make encryption stronger and unbreakable.
4.XOR Cipher –
Xor cipher uses the same known logical xor operation.Xor cipher is preferred in many complex
encryption techniques over other known logical operations due to its property, which is, it has no data
leakage. Use of Xor cipher is also seen in many hashing techniques for example - in the SHA-2 family.
5.Modular Arithmetic –
IEEE PROJECT TOPICS & ABSTRACTS BY SOFTRONIICS
SOFTONIICS WWW.SOFTRONIICS.IN
CALICUT||PALAKKAD||COIMBATORE 9037061113||9037291113
Modular arithmetic is a very well known mathematical technique which is many times used for wrapping
around. In this technique, the output value obtained is always less than a predefined value, also known
as modulus.
PROPOSED SYSTEM
The main focus of the proposed system is to increase the randomness of the generated ciphertext so
that it is difficult to break the cipher. Another point on which the propsed system focuses is the way in
which symmetric key is transferred. The proposed system secures transfer of such confidential data by
providing a way to check the data integrity. In the propsed system, the actual key is not transferred,
rather the OTP on which the operations are performed and key is generated is transferred. OTP is
generated based on the stream of input characters and then a set of mathematical and logical
operations are performed on it to generate a key for encryption. The same OTP is transferred along
with an integer value which is result of xor of OTP, key and other used values along with a predefined
constant. At receiving end, again the xor value is generated from OTP, key and other transferred values
and xored with transferred xored integer value. If it gives the predefined constant then it can be made
sure that -data has not been altered.

More Related Content

PPTX
Encryption
PPTX
Data encryption
PDF
Simulated Analysis and Enhancement of Blowfish Algorithm
PPT
CRYPTOGRAPHY
PDF
Implementation of aes and blowfish algorithm
PPTX
Encryption
PDF
Search on encrypted data
PDF
Searchable Encryption Systems
Encryption
Data encryption
Simulated Analysis and Enhancement of Blowfish Algorithm
CRYPTOGRAPHY
Implementation of aes and blowfish algorithm
Encryption
Search on encrypted data
Searchable Encryption Systems

What's hot (20)

PPTX
Cryptography by Durlab Kumbhakar
PPTX
Er. Sanjeev Raaz
PPTX
PDF
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Encryption
PPTX
Symmetric encryption and message confidentiality
 
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPT
Cryptography and Message Authentication NS3
PPTX
Secure Encryption Technique (SET): A Private Key Cryptosystem
PPT
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
PDF
Public Key Encryption & Hash functions
PDF
A new hybrid text encryption approach over mobile ad hoc network
PPTX
Network security
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPS
Message AUthentication Code
PPS
Criptography
PPT
Distribution of public keys and hmac
PPT
Block Ciphers Modes of Operation
Cryptography by Durlab Kumbhakar
Er. Sanjeev Raaz
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Encryption
Symmetric encryption and message confidentiality
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Cryptography and Message Authentication NS3
Secure Encryption Technique (SET): A Private Key Cryptosystem
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
Public Key Encryption & Hash functions
A new hybrid text encryption approach over mobile ad hoc network
Network security
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Message AUthentication Code
Criptography
Distribution of public keys and hmac
Block Ciphers Modes of Operation
Ad

Similar to Php text processing by softroniics (20)

PDF
IRJET- Data Encryption and Decryption using RF Module
PDF
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
PDF
A New Modified Version of Caser Cipher Algorithm
PDF
Securing Mobile Data using Cryptography
PDF
ijrrest_vol-2_issue-2_015
PDF
Analysing space complexity of various encryption algorithms 2
PDF
Block cipher encryption for text to-image algorithm
PPTX
Classical$ nn Encryption Techniques.pptx
PDF
Data Communication Using Cryptography Encryption
PDF
ASCII Value Based Encryption System (AVB)
PDF
PDF
PPTX
cryptographyyy .pptx
PPTX
ServerDecwweddgccgccfgvxgxcvfxvhfxvr.pptx
PDF
researchpaperfinal1
PDF
Nearest Prime Cipher for Data Confidentiality and Integrity
PPTX
Cryptography .pptx
PPTX
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
PDF
Image Encryption Using Advanced Hill Cipher Algorithm
PPTX
TOPIC 10 - CRYPTOGRAPHY [REPORTED BY PUSTA].pptx
IRJET- Data Encryption and Decryption using RF Module
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
A New Modified Version of Caser Cipher Algorithm
Securing Mobile Data using Cryptography
ijrrest_vol-2_issue-2_015
Analysing space complexity of various encryption algorithms 2
Block cipher encryption for text to-image algorithm
Classical$ nn Encryption Techniques.pptx
Data Communication Using Cryptography Encryption
ASCII Value Based Encryption System (AVB)
cryptographyyy .pptx
ServerDecwweddgccgccfgvxgxcvfxvhfxvr.pptx
researchpaperfinal1
Nearest Prime Cipher for Data Confidentiality and Integrity
Cryptography .pptx
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
Image Encryption Using Advanced Hill Cipher Algorithm
TOPIC 10 - CRYPTOGRAPHY [REPORTED BY PUSTA].pptx
Ad

Recently uploaded (20)

PPTX
Core Concepts of Personalized Learning and Virtual Learning Environments
PDF
English Textual Question & Ans (12th Class).pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
International_Financial_Reporting_Standa.pdf
PPTX
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
PDF
semiconductor packaging in vlsi design fab
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PPTX
Education and Perspectives of Education.pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
Journal of Dental Science - UDMY (2020).pdf
PPTX
Module on health assessment of CHN. pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
Complications of Minimal Access-Surgery.pdf
Core Concepts of Personalized Learning and Virtual Learning Environments
English Textual Question & Ans (12th Class).pdf
Introduction to pro and eukaryotes and differences.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Journal of Dental Science - UDMY (2021).pdf
Unit 4 Computer Architecture Multicore Processor.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
International_Financial_Reporting_Standa.pdf
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
semiconductor packaging in vlsi design fab
My India Quiz Book_20210205121199924.pdf
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
Education and Perspectives of Education.pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Journal of Dental Science - UDMY (2020).pdf
Module on health assessment of CHN. pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
What’s under the hood: Parsing standardized learning content for AI
Complications of Minimal Access-Surgery.pdf

Php text processing by softroniics

  • 1. IEEE PROJECT TOPICS & ABSTRACTS BY SOFTRONIICS SOFTONIICS WWW.SOFTRONIICS.IN CALICUT||PALAKKAD||COIMBATORE 9037061113||9037291113 ASCII Based Text Encryption and Decryption With Check For Data Integrity Abstract: Data security is of high concern when it comes to data-transfer over the network. With increased attacks on the ciphertexts, the need to improve the ciphers has increased. Not only the data but also the key used for the cryptographic process needs to be secured as all the operations needed to retransform the ciphertext back to original plaintext depend on that key. These needs have led to many new algorithms for encryption as well as for key transfer mechanisms. In this paper, a method is proposed for improving encryption using various mathematical and logical operations and providing a check for data integrity. Cryptography means writing or study of codes. It involves various techniques used to scramble the plaintext and then unscramble it to plain original form. Two most prominent encryption methods are Symmetric Encryption and Asymmetric Encryption. Encryption techniques involve use of various mathematical as well as logical functions used to make the text unreadable. Decryption usually involves reverse of encryption operations to obtain the original plaintext. 1.Asymmetric Encryption – This method makes use of two different keys. One key is used for encrypting the data and another is used for decrypting the data. Any one key from the pair can be used for encryption and the other for decryption. 2.Symmetric Encryption – This method makes use of a single key. Client and server both agree upon a key using techniques like DiffieHellman algorithm and then the communication proceeds using that key. Unlike asymmetric encryption, in this method, decryption can be done only with the key which is used for encrypting the data. 3.One Time Pad – One Time Pad, also known as OTP, is a collection of randomly generated characters which is also the only cipher known to be mathematically unbreakable. Use of OTP in any cipher techniques can help make encryption stronger and unbreakable. 4.XOR Cipher – Xor cipher uses the same known logical xor operation.Xor cipher is preferred in many complex encryption techniques over other known logical operations due to its property, which is, it has no data leakage. Use of Xor cipher is also seen in many hashing techniques for example - in the SHA-2 family. 5.Modular Arithmetic –
  • 2. IEEE PROJECT TOPICS & ABSTRACTS BY SOFTRONIICS SOFTONIICS WWW.SOFTRONIICS.IN CALICUT||PALAKKAD||COIMBATORE 9037061113||9037291113 Modular arithmetic is a very well known mathematical technique which is many times used for wrapping around. In this technique, the output value obtained is always less than a predefined value, also known as modulus. PROPOSED SYSTEM The main focus of the proposed system is to increase the randomness of the generated ciphertext so that it is difficult to break the cipher. Another point on which the propsed system focuses is the way in which symmetric key is transferred. The proposed system secures transfer of such confidential data by providing a way to check the data integrity. In the propsed system, the actual key is not transferred, rather the OTP on which the operations are performed and key is generated is transferred. OTP is generated based on the stream of input characters and then a set of mathematical and logical operations are performed on it to generate a key for encryption. The same OTP is transferred along with an integer value which is result of xor of OTP, key and other used values along with a predefined constant. At receiving end, again the xor value is generated from OTP, key and other transferred values and xored with transferred xored integer value. If it gives the predefined constant then it can be made sure that -data has not been altered.