期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2015
卷号:3
期号:11
DOI:10.15680/IJIRCCE.2015.0311089
出版社:S&S Publications
摘要:The present method deals with bit level encryption and decryption method. Nath et al(2014) alreadyintroduced bit level encryption method using feedback. But in the present paper the authors have used some simple butvery effective bit level encryption method. The plain text is initially converted to bits and after that bit-wisecomplement is done on some random prime positions. The entire bit stream is reversed and again applied bitcomplementoperation in some random prime position. The bit complement is followed by bit-wise XOR operation andthen the modified bit streams placed in a 2-dimesional array and perform some bit operations such as leftshift, upshift,diagonal shift, cycling, rightshift number of times to make the bit patterns random. The bit operations are performednumber of times and finally bits were converted to bytes and transferred to some output file. The results show that thepresent method is very much effective to encrypt password, sms of any other confidential message.
关键词:Bit level encryption; differential attack; brute force attack; leftshift; rightshift