Path: Top -> Journal -> Jurnal Internasional -> Journal -> Computer
RDA Algortihm: Symmetric Key Algorithm
RDA Algortihm: Symmetric Key Algorithm
ISSN 2223-4985Journal from gdlhub / 2017-08-14 11:52:32
Oleh : Dinesh Goyal , Vishal Srivastava, International Journal of Information and Communication Technology Research
Dibuat : 2012-06-23, dengan 1 file
Keyword : RDA Algorithm, symmetric key
Subjek : RDA Algortihm: Symmetric Key Algorithm
Url : http://esjournals.org/journaloftechnology/archive/vol2no4/vol2no4_2.pdf
Sumber pengambilan dokumen : Internet
Cryptography is an art of illusion in which the sender encodes the message using a key and sends it over the communication
channel. The receiver on the other side of the channel decodes the message back and using the key tries to obtain back the
original message. If the key during the communication is same on both sides then it is called as symmetric key cryptography
and if is called as asymmetric key cryptography. There has been different encoding techniques used for the pain text in both
block & stream cipher mode some of them are ECB & CBC for block cipher & OFB & CBC for block cipher.
Vigenere Cipher is a Caesar Cipher substitution technique where in a Caesar cipher, each letter of the alphabet is shifted along
some number of places; for example, in a Caesar cipher of shift 3, A would become D,B would become E and so on . The
Vigenere cipher consists of several Caesar ciphers in sequence with different shift values. To encipher, a table of alphabets can
be used, termed a Vigenere square, or Vigenere table. It consists of the alphabet written out 26 times in different rows, each
alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible Caesar ciphers. At
different points in the encryption process, the cipher uses a different alphabet from one of the rows. The alphabet used at each
point depends on a repeating keyword. Decryption is performed by finding the position of the cipher text letter in a row of the
table, and then taking the label of the column in which it appears as the plaintext. For example, in row L, the cipher text .L
appears in column A, which taken as the first plaintext letter. The second letter is decrypted by looking up x in row E of the
table; it appears in column T, which is taken as the plaintext letter.
In this paper an attempt is made to design a new model of Symmetric key Cryptography using Vigenere Cipher Technique and
ECB Encoding.
Cryptography is an art of illusion in which the sender encodes the message using a key and sends it over the communication
channel. The receiver on the other side of the channel decodes the message back and using the key tries to obtain back the
original message. If the key during the communication is same on both sides then it is called as symmetric key cryptography
and if is called as asymmetric key cryptography. There has been different encoding techniques used for the pain text in both
block & stream cipher mode some of them are ECB & CBC for block cipher & OFB & CBC for block cipher.
Vigenere Cipher is a Caesar Cipher substitution technique where in a Caesar cipher, each letter of the alphabet is shifted along
some number of places; for example, in a Caesar cipher of shift 3, A would become D,B would become E and so on . The
Vigenere cipher consists of several Caesar ciphers in sequence with different shift values. To encipher, a table of alphabets can
be used, termed a Vigenere square, or Vigenere table. It consists of the alphabet written out 26 times in different rows, each
alphabet shifted cyclically to the left compared to the previous alphabet, corresponding to the 26 possible Caesar ciphers. At
different points in the encryption process, the cipher uses a different alphabet from one of the rows. The alphabet used at each
point depends on a repeating keyword. Decryption is performed by finding the position of the cipher text letter in a row of the
table, and then taking the label of the column in which it appears as the plaintext. For example, in row L, the cipher text .L
appears in column A, which taken as the first plaintext letter. The second letter is decrypted by looking up x in row E of the
table; it appears in column T, which is taken as the plaintext letter.
In this paper an attempt is made to design a new model of Symmetric key Cryptography using Vigenere Cipher Technique and
ECB Encoding.
Beri Komentar ?#(0) | Bookmark
Properti | Nilai Properti |
---|---|
ID Publisher | gdlhub |
Organisasi | International Journal of Information and Communication Technology Research |
Nama Kontak | Herti Yani, S.Kom |
Alamat | Jln. Jenderal Sudirman |
Kota | Jambi |
Daerah | Jambi |
Negara | Indonesia |
Telepon | 0741-35095 |
Fax | 0741-35093 |
E-mail Administrator | elibrarystikom@gmail.com |
E-mail CKO | elibrarystikom@gmail.com |
Print ...
Kontributor...
- , Editor: fachruddin
Download...
Download hanya untuk member.
2
File : 2.4.2.PDF
(128615 bytes)