IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 5 - Issue 10, November 2016 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A New Substitution Cipher - Random-X

[Full Text]

 

AUTHOR(S)

Falguni Patel, Mohammed Farik

 

KEYWORDS

Decryption, Encryption, Random-X cipher, Substitution cipher

 

ABSTRACT

Ciphers are the encryption methods to prepare the algorithm for encryption and decryption. The currently known ciphers are not strong enough to protect the data. A new substitution cipher Random-X, that we introduce in this paper, can be used for password encryption and data encryption. Random-X cipher is a unique substitution cipher which replaces the units of plaintext with triplets of letters. The beauty of this cipher is that the encrypted string of the same plain text is not always same. This makes it strong and difficult to crack. This paper covers the principle, the implementation ideas and testing of Random-X cipher.

 

REFERENCES

[1] Stackoverflow.com. (2016). Top Hashing and Encryption Algorithms?. [online] Available at: http://stackoverflow.com/questions/3076222/top-hashing-and-encryption-algorithms [Accessed 9 Oct. 2016].W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123135.

[2] Bradford, C. and Bradford, C. (2014). 5 Common Encryption Algorithms and the Unbreakables of the Future. [online] StorageCraft Technology Corporation. Available at: http://www.storagecraft.com/blog/5-common-encryption-algorithms/ [Accessed 9 Oct. 2016].

[3] VOCAL Technologies, L. (2016). Triple Data Encryption Standard (Triple-DES). [online] Vocal.com. Available at: https://www.vocal.com/cryptography/tdes/ [Accessed 9 Oct. 2016].

[4] SearchSecurity. (2016). What is Advanced Encryption Standard (AES)? - Definition from WhatIs.com. [online] Available at: http://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard [Accessed 15 Oct. 2016].

[5] Aesencryption.net. (2016). AES encryption. [online] Available at: http://aesencryption.net/ [Accessed 15 Oct. 2016].

[6] Cryptool-online.org. (2016). CrypTool-Online. [online] Available at: http://www.cryptool-online.org/index.php?option=com_content&view=article&id=47&Itemid=29&lang=en [Accessed 19 Oct. 2016].