Chaurasiya, Lalit and Shrivastava, S.S. (2025) A Cryptographic Technique Involving Substitution Algorithm and Logical Operator. International Journal of Innovative Science and Research Technology, 10 (3): 25mar1205. pp. 1201-1205. ISSN 2456-2165
![IJISRT25MAR1205.pdf [thumbnail of IJISRT25MAR1205.pdf]](https://eprint.ijisrt.org/style/images/fileicons/text.png)
IJISRT25MAR1205.pdf - Published Version
Download (318kB)
Abstract
The purpose of this paper is to implement an encryption and decryption algorithm for symmetric key cryptography that combines substitution method and a newly developed cryptographic technique utilizing the Xor cipher. An Xor cipher is exceptionally useful for encryption and decryption processes because it transforms bits in relation to another string of binary data (the key) that bears no relation to the primary data. This fact leads to considerable ambiguity on the part of attackers trying to guess the value of the key or the plain text, making the system more robust against security attacks.
Item Type: | Article |
---|---|
Subjects: | L Education > L Education (General) |
Divisions: | Faculty of Law, Arts and Social Sciences > School of Education |
Depositing User: | Editor IJISRT Publication |
Date Deposited: | 02 Apr 2025 16:18 |
Last Modified: | 02 Apr 2025 16:18 |
URI: | https://eprint.ijisrt.org/id/eprint/203 |