IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 3- Issue 1, January 2014 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



The Book Cipher Optimised Method To Implement Encryption And Decryption

[Full Text]

 

AUTHOR(S)

Rasika Lele, Rohit Jainani, Vihang Mikhelkar, Aniket Nade, Mrs. V. Meshram

 

KEYWORDS

Index Terms: Book Cipher, Encrypted Key, Infinite Key Space, Hashing, Auto- Destruct.

 

ABSTRACT

Abstract: We plan to re innovate the age old method of Encryption namely The Book Cipher, which can be done by removing the constraints that made it obsolete in the first place. This can be done by providing a computerized touch to the Book Cipher, reducing the size of the formed Cipher Text after encoding, and creating an Encrypted Key for this Cipher. This system also provides an Infinite Key Space for the formed encryption. To introduce another level of security to this Cipher text, we plan to further Hash the encrypted key, and introduce an Auto-Destruct functionality to the Cipher Text.

 

REFERENCES

[1]. Changda Wang and Shiguang Ju “ A Novel Method to Implement Book Cipher “,Journal Of Computer ,Vol 5,No 11,November 2010

[2]. Craig Smith “Basic Cryptanalysis Techniques “ November 17th 2001

[3]. Roxna Geambasu ,Tadayoshi Kohno ,Amit A. Levy and Henry M. Levy “Vanish : Increasing Data Privacy with Self-Destructing Data ,University of Washington