Data transmission encryption and decryption algorithm in network security

  • Authors:
  • Tsang-Yean Lee;Huey-Ming Lee;Homer Wu;Jin-Shieh Su

  • Affiliations:
  • Department of Information Management, Chinese Culture University, Taipei, Taiwan;Department of Information Management, Chinese Culture University, Taipei, Taiwan;Department of Information Management, Chinese Culture University, Taipei, Taiwan;Department of Information Management, Chinese Culture University, Taipei, Taiwan

  • Venue:
  • SMO'06 Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we proposed the encryption algorithm to encrypt plaintext to cipher text and the decryption algorithm to do the reverse. We applied the basic computing operations to design these algorithms in this study. We used the inserting dummy symbols, rotating, transposition, shifting, complement and inserting control byte to build the data and tables in the encryption algorithm. These operations are simple and easily to implement. Without knowing the data and tables of encryption, it is difficult to do cryptanalysis. In the decryption algorithm, we used these data and tables to decrypt cipher text to plaintext. We can easily apply these algorithms to transmit data in network and the data transmission is secure.