Loading

An Approach of Private-Key Encryption Technique Based on Multiple Operators And Nth Even or Odd Term For Even or Odd Bit Position‟s Value of A Plain Text‟s Character
Ramakrishna Das1, Saurabh Dutta2
1Ramkrishna Das, Department of Computer Applications, Haldia Institute of Technology, Haldia, India.
2Saurabh Dutta, Department of Computer Applications, Dr B.C. Roy Engineering College, Durgapur, India.
Manuscript received on March 18, 2013. | Revised Manuscript received on April 14, 2013. | Manuscript published on April 30, 2013. | PP: 520-524 | Volume-2, Issue-4, April 2013. | Retrieval Number: D1510042413/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Private-key cryptography is a cryptographic system that uses the same secret key to encrypt and decrypt messages. The problem with this method is transmitting the secret key to the person that needs it without it being intercepted Here, we have proposed an idea to increase the security of private-key encryption technique. We have focused on the secret procedure to retrieve secret value from the private-key rather than securing the actual private-key value. The encryption is done by the secret value derived from the private-key. The secret value is being derived by making arithmetic operation between two decimal values. Those decimal values are derived by taking the binary values from even and odd bit position of a plain text’s character respectively. The operators are supplied by the user. As the formations of ‘0’ and ‘1’ are different for each distinct character in the plain text file, so we get different or may be distinct secret private-key value for each of the distinct character in the plain text. Thus the security is increased.
Keywords: Even or odd bit position, Nth Even or Odd term, Private-key Encryption, Stream Cipher.