Research Article

144-Bit Encryption/Decryption Technique

by  Puvvula Bhargava, Kuppam Hari Kishan
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Issue 21
Published: February 2010
Authors: Puvvula Bhargava, Kuppam Hari Kishan
10.5120/53-647
PDF

Puvvula Bhargava, Kuppam Hari Kishan . 144-Bit Encryption/Decryption Technique. International Journal of Computer Applications. 1, 21 (February 2010), 63-70. DOI=10.5120/53-647

                        @article{ 10.5120/53-647,
                        author  = { Puvvula Bhargava,Kuppam Hari Kishan },
                        title   = { 144-Bit Encryption/Decryption Technique },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 1 },
                        number  = { 21 },
                        pages   = { 63-70 },
                        doi     = { 10.5120/53-647 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A Puvvula Bhargava
                        %A Kuppam Hari Kishan
                        %T 144-Bit Encryption/Decryption Technique%T 
                        %J International Journal of Computer Applications
                        %V 1
                        %N 21
                        %P 63-70
                        %R 10.5120/53-647
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we introduce a new 144-bit cryptographic algorithm .This is done using a 16-segment electronic display and arranging the bits in a rectangular matrix and then converting it into nearest square matrix with the addition of dummy bits and rearranging the individual bits by a newly proposed mathematical approach.

References
  • Ronald L. Rivest: The MD4 Message Digest Algorithm. Internet : RFC 1320 April 1992.
  • Ronald L. Rivest: The MD5 Message Digest Algorithm. Internet : RFC 1321 April 1992.
  • Xiaoyun Wang, Yiqun Lisa Yin and Hongbo Yu, Finding Collisions in the Full SHA-1, Crypto 2005
  • S. L. M. Barreto, V. Rijmen, "The WHIRLPOOL Hashing Function," First open NESSIE Workshop, Leuven, 13-14 November 2000.
  • Florent Chabaud, Antoine Joux: Differential Collisions in SHA-0. CRYPTO 1998. pp56–71
  • Petitcolas, F. A. P., Anderson, R. J., Kuhn, M. G.: Information Hiding: A Survey. Proc. of the IEEE, Vol. 87, No.7, pp.1062-1078 (1999).
  • Bruce Schneier. Applied Cryptography. John Wiley & Sons, 1996.
  • Data Security -By Johnson and Peter (Tata Mc -Hill)
  • Secure communication -By Marquis (Tata Mc -Hill)
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Assignment mode pattern mode base code element code

Powered by PhDFocusTM