SlideShare a Scribd company logo
IEEE PROJECT TOPICS & ABSTRACTS BY SOFTRONIICS
SOFTONIICS WWW.SOFTRONIICS.IN
CALICUT||PALAKKAD||COIMBATORE 9037061113||9037291113
ASCII Based Text Encryption and Decryption
With Check For Data Integrity
Abstract:
Data security is of high concern when it comes to data-transfer over the network. With increased attacks
on the ciphertexts, the need to improve the ciphers has increased. Not only the data but also the key
used for the cryptographic process needs to be secured as all the operations needed to retransform the
ciphertext back to original plaintext depend on that key. These needs have led to many new algorithms
for encryption as well as for key transfer mechanisms. In this paper, a method is proposed for improving
encryption using various mathematical and logical operations and providing a check for data integrity.
Cryptography means writing or study of codes. It involves various techniques used to scramble the
plaintext and then unscramble it to plain original form. Two most prominent
encryption methods are Symmetric Encryption and Asymmetric Encryption. Encryption techniques
involve use of various mathematical as well as logical functions used to make the text unreadable.
Decryption usually involves reverse of encryption operations to obtain the
original plaintext.
1.Asymmetric Encryption –
This method makes use of two different keys. One key is used for encrypting the data and another is
used for decrypting the data. Any one key from the pair can be used for encryption and the other for
decryption.
2.Symmetric Encryption –
This method makes use of a single key. Client and server both agree upon a key using techniques like
DiffieHellman algorithm and then the communication proceeds using that key. Unlike asymmetric
encryption, in this method, decryption can be done only with the key which is used for encrypting the
data.
3.One Time Pad –
One Time Pad, also known as OTP, is a collection of randomly generated characters which is also the
only cipher known to be mathematically unbreakable. Use of OTP in any cipher techniques can help
make encryption stronger and unbreakable.
4.XOR Cipher –
Xor cipher uses the same known logical xor operation.Xor cipher is preferred in many complex
encryption techniques over other known logical operations due to its property, which is, it has no data
leakage. Use of Xor cipher is also seen in many hashing techniques for example - in the SHA-2 family.
5.Modular Arithmetic –
IEEE PROJECT TOPICS & ABSTRACTS BY SOFTRONIICS
SOFTONIICS WWW.SOFTRONIICS.IN
CALICUT||PALAKKAD||COIMBATORE 9037061113||9037291113
Modular arithmetic is a very well known mathematical technique which is many times used for wrapping
around. In this technique, the output value obtained is always less than a predefined value, also known
as modulus.
PROPOSED SYSTEM
The main focus of the proposed system is to increase the randomness of the generated ciphertext so
that it is difficult to break the cipher. Another point on which the propsed system focuses is the way in
which symmetric key is transferred. The proposed system secures transfer of such confidential data by
providing a way to check the data integrity. In the propsed system, the actual key is not transferred,
rather the OTP on which the operations are performed and key is generated is transferred. OTP is
generated based on the stream of input characters and then a set of mathematical and logical
operations are performed on it to generate a key for encryption. The same OTP is transferred along
with an integer value which is result of xor of OTP, key and other used values along with a predefined
constant. At receiving end, again the xor value is generated from OTP, key and other transferred values
and xored with transferred xored integer value. If it gives the predefined constant then it can be made
sure that -data has not been altered.
Ad

Recommended

Encryption
Encryption
Nitin Parbhakar
 
Data encryption
Data encryption
Deepam Goyal
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
iosrjce
 
CRYPTOGRAPHY
CRYPTOGRAPHY
SHUBHA CHATURVEDI
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
Encryption
Encryption
Jasleen Khalsa
 
Search on encrypted data
Search on encrypted data
SELASI OCANSEY
 
Searchable Encryption Systems
Searchable Encryption Systems
Christopher Frenz
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
Er. Sanjeev Raaz
Er. Sanjeev Raaz
Sanjeev Raaz
 
Asif
Asif
Mohammad Asif
 
Encryption
Encryption
Syed Taimoor Hussain Shah
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
Editor IJCATR
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Encryption
Encryption
keith dias
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
koolkampus
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key Cryptosystem
Avishek Datta
 
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
EC-Council
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functions
Dr.Florence Dayana
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
Network security
Network security
ABHISHEK KUMAR
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Message AUthentication Code
Message AUthentication Code
Keval Bhogayata
 
Criptography
Criptography
Sajan Sahu
 
Distribution of public keys and hmac
Distribution of public keys and hmac
anuragjagetiya
 
Block Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
IRJET- Data Encryption and Decryption using RF Module
IRJET- Data Encryption and Decryption using RF Module
IRJET Journal
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
IDES Editor
 

More Related Content

What's hot (20)

Cryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
Er. Sanjeev Raaz
Er. Sanjeev Raaz
Sanjeev Raaz
 
Asif
Asif
Mohammad Asif
 
Encryption
Encryption
Syed Taimoor Hussain Shah
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
Editor IJCATR
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Encryption
Encryption
keith dias
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
koolkampus
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key Cryptosystem
Avishek Datta
 
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
EC-Council
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functions
Dr.Florence Dayana
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
Network security
Network security
ABHISHEK KUMAR
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Message AUthentication Code
Message AUthentication Code
Keval Bhogayata
 
Criptography
Criptography
Sajan Sahu
 
Distribution of public keys and hmac
Distribution of public keys and hmac
anuragjagetiya
 
Block Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
Cryptography by Durlab Kumbhakar
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
Editor IJCATR
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
koolkampus
 
Secure Encryption Technique (SET): A Private Key Cryptosystem
Secure Encryption Technique (SET): A Private Key Cryptosystem
Avishek Datta
 
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
EC-Council
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functions
Dr.Florence Dayana
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
 
Message AUthentication Code
Message AUthentication Code
Keval Bhogayata
 
Distribution of public keys and hmac
Distribution of public keys and hmac
anuragjagetiya
 

Similar to Php text processing by softroniics (20)

IRJET- Data Encryption and Decryption using RF Module
IRJET- Data Encryption and Decryption using RF Module
IRJET Journal
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
IDES Editor
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
IJERD Editor
 
Securing Mobile Data using Cryptography
Securing Mobile Data using Cryptography
Eswar Publications
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
Ashish Gupta
 
Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2
IAEME Publication
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
IAEME Publication
 
Classical$ nn Encryption Techniques.pptx
Classical$ nn Encryption Techniques.pptx
ShaikhSahid
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography Encryption
BRNSSPublicationHubI
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
IJERA Editor
 
82 86
82 86
Editor IJARCET
 
82 86
82 86
Editor IJARCET
 
ServerDecwweddgccgccfgvxgxcvfxvhfxvr.pptx
ServerDecwweddgccgccfgvxgxcvfxvhfxvr.pptx
t01151009418
 
researchpaperfinal1
researchpaperfinal1
Sumit Bajaj
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
Eswar Publications
 
Cryptography .pptx
Cryptography .pptx
abhinandpk2405
 
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
ajajkhan16
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
IDES Editor
 
TOPIC 10 - CRYPTOGRAPHY [REPORTED BY PUSTA].pptx
TOPIC 10 - CRYPTOGRAPHY [REPORTED BY PUSTA].pptx
sndtcdya
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
CSCJournals
 
IRJET- Data Encryption and Decryption using RF Module
IRJET- Data Encryption and Decryption using RF Module
IRJET Journal
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
IDES Editor
 
A New Modified Version of Caser Cipher Algorithm
A New Modified Version of Caser Cipher Algorithm
IJERD Editor
 
Securing Mobile Data using Cryptography
Securing Mobile Data using Cryptography
Eswar Publications
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
Ashish Gupta
 
Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2
IAEME Publication
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
IAEME Publication
 
Classical$ nn Encryption Techniques.pptx
Classical$ nn Encryption Techniques.pptx
ShaikhSahid
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography Encryption
BRNSSPublicationHubI
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
IJERA Editor
 
ServerDecwweddgccgccfgvxgxcvfxvhfxvr.pptx
ServerDecwweddgccgccfgvxgxcvfxvhfxvr.pptx
t01151009418
 
researchpaperfinal1
researchpaperfinal1
Sumit Bajaj
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
Eswar Publications
 
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
SYMMETRIC CYPHER MODELS WITH SUITABLE DIAGRAM.pptx
ajajkhan16
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
IDES Editor
 
TOPIC 10 - CRYPTOGRAPHY [REPORTED BY PUSTA].pptx
TOPIC 10 - CRYPTOGRAPHY [REPORTED BY PUSTA].pptx
sndtcdya
 
Cryptographic Algorithms For Secure Data Communication
Cryptographic Algorithms For Secure Data Communication
CSCJournals
 
Ad

Recently uploaded (20)

A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
This is why students from these 44 institutions have not received National Se...
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
Birnagar High School Platinum Jubilee Quiz.pptx
Birnagar High School Platinum Jubilee Quiz.pptx
Sourav Kr Podder
 
INDUCTIVE EFFECT slide for first prof pharamacy students
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
Mayvel Nadal
 
VCE Literature Section A Exam Response Guide
VCE Literature Section A Exam Response Guide
jpinnuck
 
How to Customize Quotation Layouts in Odoo 18
How to Customize Quotation Layouts in Odoo 18
Celine George
 
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
sumadsadjelly121997
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
Pests of Maize: An comprehensive overview.pptx
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
 
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
KaryanaTantri21
 
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Rajdeep Bavaliya
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
LDMMIA Yoga S10 Free Workshop Grad Level
LDMMIA Yoga S10 Free Workshop Grad Level
LDM & Mia eStudios
 
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
 
Intellectual Property Right (Jurisprudence).pptx
Intellectual Property Right (Jurisprudence).pptx
Vishal Chanalia
 
How to use search fetch method in Odoo 18
How to use search fetch method in Odoo 18
Celine George
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 6-14-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 6-14-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
K12 Tableau User Group virtual event June 18, 2025
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
SCHIZOPHRENIA OTHER PSYCHOTIC DISORDER LIKE Persistent delusion/Capgras syndr...
SCHIZOPHRENIA OTHER PSYCHOTIC DISORDER LIKE Persistent delusion/Capgras syndr...
parmarjuli1412
 
A Visual Introduction to the Prophet Jeremiah
A Visual Introduction to the Prophet Jeremiah
Steve Thomason
 
This is why students from these 44 institutions have not received National Se...
This is why students from these 44 institutions have not received National Se...
Kweku Zurek
 
Birnagar High School Platinum Jubilee Quiz.pptx
Birnagar High School Platinum Jubilee Quiz.pptx
Sourav Kr Podder
 
INDUCTIVE EFFECT slide for first prof pharamacy students
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
ENGLISH-5 Q1 Lesson 1.pptx - Story Elements
Mayvel Nadal
 
VCE Literature Section A Exam Response Guide
VCE Literature Section A Exam Response Guide
jpinnuck
 
How to Customize Quotation Layouts in Odoo 18
How to Customize Quotation Layouts in Odoo 18
Celine George
 
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
Filipino 9 Maikling Kwento Ang Ama Panitikang Asiyano
sumadsadjelly121997
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
Pests of Maize: An comprehensive overview.pptx
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
 
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
Romanticism in Love and Sacrifice An Analysis of Oscar Wilde’s The Nightingal...
KaryanaTantri21
 
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Rajdeep Bavaliya
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
LDMMIA Yoga S10 Free Workshop Grad Level
LDMMIA Yoga S10 Free Workshop Grad Level
LDM & Mia eStudios
 
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
University of Ghana Cracks Down on Misconduct: Over 100 Students Sanctioned
Kweku Zurek
 
Intellectual Property Right (Jurisprudence).pptx
Intellectual Property Right (Jurisprudence).pptx
Vishal Chanalia
 
How to use search fetch method in Odoo 18
How to use search fetch method in Odoo 18
Celine George
 
K12 Tableau User Group virtual event June 18, 2025
K12 Tableau User Group virtual event June 18, 2025
dogden2
 
SCHIZOPHRENIA OTHER PSYCHOTIC DISORDER LIKE Persistent delusion/Capgras syndr...
SCHIZOPHRENIA OTHER PSYCHOTIC DISORDER LIKE Persistent delusion/Capgras syndr...
parmarjuli1412
 
Ad

Php text processing by softroniics

  • 1. IEEE PROJECT TOPICS & ABSTRACTS BY SOFTRONIICS SOFTONIICS WWW.SOFTRONIICS.IN CALICUT||PALAKKAD||COIMBATORE 9037061113||9037291113 ASCII Based Text Encryption and Decryption With Check For Data Integrity Abstract: Data security is of high concern when it comes to data-transfer over the network. With increased attacks on the ciphertexts, the need to improve the ciphers has increased. Not only the data but also the key used for the cryptographic process needs to be secured as all the operations needed to retransform the ciphertext back to original plaintext depend on that key. These needs have led to many new algorithms for encryption as well as for key transfer mechanisms. In this paper, a method is proposed for improving encryption using various mathematical and logical operations and providing a check for data integrity. Cryptography means writing or study of codes. It involves various techniques used to scramble the plaintext and then unscramble it to plain original form. Two most prominent encryption methods are Symmetric Encryption and Asymmetric Encryption. Encryption techniques involve use of various mathematical as well as logical functions used to make the text unreadable. Decryption usually involves reverse of encryption operations to obtain the original plaintext. 1.Asymmetric Encryption – This method makes use of two different keys. One key is used for encrypting the data and another is used for decrypting the data. Any one key from the pair can be used for encryption and the other for decryption. 2.Symmetric Encryption – This method makes use of a single key. Client and server both agree upon a key using techniques like DiffieHellman algorithm and then the communication proceeds using that key. Unlike asymmetric encryption, in this method, decryption can be done only with the key which is used for encrypting the data. 3.One Time Pad – One Time Pad, also known as OTP, is a collection of randomly generated characters which is also the only cipher known to be mathematically unbreakable. Use of OTP in any cipher techniques can help make encryption stronger and unbreakable. 4.XOR Cipher – Xor cipher uses the same known logical xor operation.Xor cipher is preferred in many complex encryption techniques over other known logical operations due to its property, which is, it has no data leakage. Use of Xor cipher is also seen in many hashing techniques for example - in the SHA-2 family. 5.Modular Arithmetic –
  • 2. IEEE PROJECT TOPICS & ABSTRACTS BY SOFTRONIICS SOFTONIICS WWW.SOFTRONIICS.IN CALICUT||PALAKKAD||COIMBATORE 9037061113||9037291113 Modular arithmetic is a very well known mathematical technique which is many times used for wrapping around. In this technique, the output value obtained is always less than a predefined value, also known as modulus. PROPOSED SYSTEM The main focus of the proposed system is to increase the randomness of the generated ciphertext so that it is difficult to break the cipher. Another point on which the propsed system focuses is the way in which symmetric key is transferred. The proposed system secures transfer of such confidential data by providing a way to check the data integrity. In the propsed system, the actual key is not transferred, rather the OTP on which the operations are performed and key is generated is transferred. OTP is generated based on the stream of input characters and then a set of mathematical and logical operations are performed on it to generate a key for encryption. The same OTP is transferred along with an integer value which is result of xor of OTP, key and other used values along with a predefined constant. At receiving end, again the xor value is generated from OTP, key and other transferred values and xored with transferred xored integer value. If it gives the predefined constant then it can be made sure that -data has not been altered.