作者
Ajit Danti, Rajesh Nayak
发表日期
2013
期刊
International Journal Of Innovationsin Engineering And Technology (IJIET)
卷号
2
期号
4
页码范围
270-276
简介
In modern world, cryptography hackers try to break a cryptographic algorithm or try to retrieve the key, which is needed to encrypt a message (data), by analyzing the insertion or presence of repetitive bits/characters (bytes) in the message and encrypted message to find out the encryption algorithm or the key used for it. So it is must for a good encryption method to exclude the repetitive terms such that no trace of repetitions can be tracked down., Somdip Dey, Joyshree Nath and Ashoke Nath (SJA) is an amalgamation of Modified Caesar cipher (MCC), Bit Rotation Reversal (BRR), Neeraj Khanna, Joel James, Joyshree Nath, Sayantyan Chakraborty, Amlan Chakrabarti, Asoke nath (NJJSAA), Function Encryption (FE) methods. By using MCC, BRR, NJJSAA and FE methods we can reduce time complexity by exluding repetitive characters in the cipher text. The proposed method is robust in terms of efficiency and computational costs
引用总数
学术搜索中的文章
A Danti, R Nayak - International Journal Of Innovationsin Engineering And …, 2013