Chaurasiya, Lalit and Shrivastava, S.S. (2025) A Cryptographic Technique Involving Substitution Algorithm and Logical Operator. International Journal of Innovative Science and Research Technology, 10 (3): 25mar1205. pp. 1201-1205. ISSN 2456-2165

[thumbnail of IJISRT25MAR1205.pdf] Text
IJISRT25MAR1205.pdf - Published Version

Download (318kB)

Abstract

The purpose of this paper is to implement an encryption and decryption algorithm for symmetric key cryptography that combines substitution method and a newly developed cryptographic technique utilizing the Xor cipher. An Xor cipher is exceptionally useful for encryption and decryption processes because it transforms bits in relation to another string of binary data (the key) that bears no relation to the primary data. This fact leads to considerable ambiguity on the part of attackers trying to guess the value of the key or the plain text, making the system more robust against security attacks.

Item Type: Article
Subjects: L Education > L Education (General)
Divisions: Faculty of Law, Arts and Social Sciences > School of Education
Depositing User: Editor IJISRT Publication
Date Deposited: 02 Apr 2025 16:18
Last Modified: 02 Apr 2025 16:18
URI: https://eprint.ijisrt.org/id/eprint/203

Actions (login required)

View Item
View Item