Skip to main content
Article thumbnail
Location of Repository

Nearest Prime Cipher for Data Confidentiality and Integrity

By Dr. S. Kiran, N. Subramanyan, Y. Suma and K. Haripriya

Abstract

Communication is the process of transmitting information from source to destination. The information exchanged between sender and receiver through the proper channel. The information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information\ud cryptography techniques are used. The key is playing prominent role in cryptography. This paper proposes a novel method for key generation by using nearest primes. Further 2’s complement and logical operations are used in encryption and decryption process. The final cipher text is generated by representing the intermediate\ud cipher in matrix form and then read by column wise

Topics: 2’s complement, Ciphertext, Cryptography, Nearest prime number, Plaintext, XOR operation, Information technology, T58.5-58.64, Industrial engineering. Management engineering, T55.4-60.8, Technology (General), T1-995, Technology, T
Publisher: Eswar Publications
Year: 2016
OAI identifier: oai:doaj.org/article:be82a2279bee4579a1b470690f69def7
Journal:
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • https://doaj.org/toc/0975-0282 (external link)
  • https://doaj.org/toc/0975-0290 (external link)
  • http://www.ijana.in/papers/V7I... (external link)
  • https://doaj.org/article/be82a... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.