Path: Top -> Journal -> Jurnal Internasional -> Journal -> Computer

RDA Algortihm: Symmetric Key Algorithm

RDA Algortihm: Symmetric Key Algorithm

ISSN 2223-4985
Journal from gdlhub / 2017-08-14 11:52:32
Oleh : Dinesh Goyal , Vishal Srivastava, International Journal of Information and Communication Technology Research
Dibuat : 2012-06-23, dengan 1 file

Keyword : RDA Algorithm, symmetric key
Subjek : RDA Algortihm: Symmetric Key Algorithm
Url : http://esjournals.org/journaloftechnology/archive/vol2no4/vol2no4_2.pdf
Sumber pengambilan dokumen : Internet

Cryptography is an art of illusion in which the sender encodes the message using a key and sends it over the communication


channel. The receiver on the other side of the channel decodes the message back and using the key tries to obtain back the


original message. If the key during the communication is same on both sides then it is called as symmetric key cryptography


and if is called as asymmetric key cryptography. There has been different encoding techniques used for the pain text in both


block & stream cipher mode some of them are ECB & CBC for block cipher & OFB & CBC for block cipher.


Vigenere Cipher is a Caesar Cipher substitution technique where in a Caesar cipher, each letter of the alphabet is shifted along


some number of places; for example, in a Caesar cipher of shift 3, A would become D,B would become E and so on . The


Vigenere cipher consists of several Caesar ciphers in sequence with different shift values. To encipher, a table of alphabets can


be used, termed a Vigenere square, or Vigenere table. It consists of the alphabet written out 26 times in different rows, each


alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible Caesar ciphers. At


different points in the encryption process, the cipher uses a different alphabet from one of the rows. The alphabet used at each


point depends on a repeating keyword. Decryption is performed by finding the position of the cipher text letter in a row of the


table, and then taking the label of the column in which it appears as the plaintext. For example, in row L, the cipher text .L


appears in column A, which taken as the first plaintext letter. The second letter is decrypted by looking up x in row E of the


table; it appears in column T, which is taken as the plaintext letter.


In this paper an attempt is made to design a new model of Symmetric key Cryptography using Vigenere Cipher Technique and


ECB Encoding.

Deskripsi Alternatif :

Cryptography is an art of illusion in which the sender encodes the message using a key and sends it over the communication


channel. The receiver on the other side of the channel decodes the message back and using the key tries to obtain back the


original message. If the key during the communication is same on both sides then it is called as symmetric key cryptography


and if is called as asymmetric key cryptography. There has been different encoding techniques used for the pain text in both


block & stream cipher mode some of them are ECB & CBC for block cipher & OFB & CBC for block cipher.


Vigenere Cipher is a Caesar Cipher substitution technique where in a Caesar cipher, each letter of the alphabet is shifted along


some number of places; for example, in a Caesar cipher of shift 3, A would become D,B would become E and so on . The


Vigenere cipher consists of several Caesar ciphers in sequence with different shift values. To encipher, a table of alphabets can


be used, termed a Vigenere square, or Vigenere table. It consists of the alphabet written out 26 times in different rows, each


alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible Caesar ciphers. At


different points in the encryption process, the cipher uses a different alphabet from one of the rows. The alphabet used at each


point depends on a repeating keyword. Decryption is performed by finding the position of the cipher text letter in a row of the


table, and then taking the label of the column in which it appears as the plaintext. For example, in row L, the cipher text .L


appears in column A, which taken as the first plaintext letter. The second letter is decrypted by looking up x in row E of the


table; it appears in column T, which is taken as the plaintext letter.


In this paper an attempt is made to design a new model of Symmetric key Cryptography using Vigenere Cipher Technique and


ECB Encoding.

Beri Komentar ?#(0) | Bookmark

PropertiNilai Properti
ID Publishergdlhub
OrganisasiInternational Journal of Information and Communication Technology Research
Nama KontakHerti Yani, S.Kom
AlamatJln. Jenderal Sudirman
KotaJambi
DaerahJambi
NegaraIndonesia
Telepon0741-35095
Fax0741-35093
E-mail Administratorelibrarystikom@gmail.com
E-mail CKOelibrarystikom@gmail.com

Print ...

Kontributor...

  • , Editor: fachruddin

Download...

  • Download hanya untuk member.

    2
    Download Image
    File : 2.4.2.PDF

    (128615 bytes)