Differential cryptanalysis of the data encryption standard
Differential cryptanalysis of the data encryption standard
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Cryptography and data security
Cryptography and data security
Fundamentals of Computer Security
Fundamentals of Computer Security
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
One Way Hash Functions and DES
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
The FEAL-8 Cryptosystem and a Call for Attack
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
A Statistical Attack of the FEAL-8 Cryptosystem
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Algorithm of cipher text containing key to produce cipher text transmitted in network security
AIKED'07 Proceedings of the 6th Conference on 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases - Volume 6
Diffusing RFID-sensor networks and security threats
WSEAS Transactions on Signal Processing
Hi-index | 0.00 |
In this paper, we proposed the encryption algorithm to encrypt plaintext to cipher text and the decryption algorithm to do the reverse. We applied the basic computing operations to design these algorithms in this study. We used the inserting dummy symbols, rotating, transposition, shifting, complement and inserting control byte to build the data and tables in the encryption algorithm. These operations are simple and easily to implement. Without knowing the data and tables of encryption, it is difficult to do cryptanalysis. In the decryption algorithm, we used these data and tables to decrypt cipher text to plaintext. We can easily apply these algorithms to transmit data in network and the data transmission is secure.