Article Fingerprint
ReserarchID
2A8P7
The efficiency of a cryptographic algorithm is based on its time taken for encryption / decryption and the way it produces diverse cipher text from a clear text. The RSA, the extensively used public key algorithm and other public key algorithms may not guarantee that the cipher text is copiously secured. As an alternative approach to handling ASCII characters in the cryptosystems, a magic square implementation is deliberated of in this work. It attempts to augment the efficiency by providing add-on security to the cryptosystem. This approach will boost the security due to its complexity in encryption because it deals with the magic square. Here, encryption / decryption is based on numerals generated by magic square rather than ASCII values. In this, we add the ASCII value and the numeral in the consequent magic square. Because to encrypt the plaintext characters, their ASCII values are taken and if a character occurs in numerous places in a plaintext there is a possibility of same cipher text is produced. To surmount the problem, this paper attempts to develop a technique in which a constant is added for the recurring character.
S. Praveen Kumar. 1970. \u201cNovel Advent For Add-On Security By Magic Square Intrication\u201d. Unknown Journal GJCST Volume 11 (GJCST Volume 11 Issue 21): .
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 105
Country: India
Subject: Uncategorized
Authors: S. Praveen Kumar,K. Naveen Kumar,S. Sreenadh,B. Aravind,Komaraju Hemanth kumar (PhD/Dr. count: 0)
View Count (all-time): 127
Total Views (Real + Logic): 20606
Total Downloads (simulated): 10900
Publish Date: 1970 01, Thu
Monthly Totals (Real + Logic):
This paper attempted to assess the attitudes of students in
Advances in technology have created the potential for a new
Inclusion has become a priority on the global educational agenda,
The efficiency of a cryptographic algorithm is based on its time taken for encryption / decryption and the way it produces diverse cipher text from a clear text. The RSA, the extensively used public key algorithm and other public key algorithms may not guarantee that the cipher text is copiously secured. As an alternative approach to handling ASCII characters in the cryptosystems, a magic square implementation is deliberated of in this work. It attempts to augment the efficiency by providing add-on security to the cryptosystem. This approach will boost the security due to its complexity in encryption because it deals with the magic square. Here, encryption / decryption is based on numerals generated by magic square rather than ASCII values. In this, we add the ASCII value and the numeral in the consequent magic square. Because to encrypt the plaintext characters, their ASCII values are taken and if a character occurs in numerous places in a plaintext there is a possibility of same cipher text is produced. To surmount the problem, this paper attempts to develop a technique in which a constant is added for the recurring character.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.