SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -28
Noise Driven Encryption Algorithm (NDEA) Version-1
Aashijit Mukhopadhyay Somnath Saha Naved Ahmed Tagala Asoke Nath
St. Xavier’s College St. Xavier’s College St. Xavier’s College St. Xavier’s College
(Autonomous) (Autonomous) (Autonomous) (Autonomous)
Kolkata Kolkata Kolkata Kolkata
Abstract— In the present paper the authors introduced an algorithm for encrypting useful data at bit level. The
authors have used a new technique of introducing noise wave over the bit patterns of the plain text to encrypt it. Noise
has been defined as the complement of the present bit pattern. Certain window layers have been selected over the bit
patterns and noise wave has been made to propagate over those pattern in concentric circular fashion thus encrypting
the whole bit text present. Windows are picked up from the bit patterns randomly and noise wave is made to propagate
from any random position with a random intensity. Noise propagates inside the medium with decreased intensity as
one move farther from the source of noise using natural laws. The method has been applied on some standard text
and the output has been found to be totally unpredictable. The method can be used to encrypt OTP (One Time
Password) and other bank transactions.
Keywords— Noise, Plain Text, Encryption, Decryption, AFES
I. INTRODUCTION
With the advancement of internet technologies, information flow over the internet has increased manifold. Due to the
extensive information flow, the security of each bit of the information becomes very vital. The main applications of
secured data transfer are in money transfer applications. Online banking has been the most important sector of fund
transfer. During fund transfer, vital information such as the pin of the user is present in the network for a considerable
period of time. This information must be properly encrypted in order to secure this vital information from the hackers.
The algorithm AFES-1 that has been recently proposed has been a great help for the logical birth of the present algorithm.
In AFES-1, the Plain Text is converted to its corresponding bits and stored in a square matrix of size equal to the integral
square root of the number of bits. The residual bits remain untouched. Then the bits are arranged by calling 24 different
shifting functions. Now, the order of calling the 24 functions change at each iteration and that order is taken as a function
of the keypad. The bits extracted from the above algorithm are then encrypted more using MWFES-3. This algorithm has
been found to be very useful against any brute force attack. In the present paper, the authors have suggested a new
technique where concentric propagation of noise over the useful data is used as the prime authority of the method. Now
the medium through which the noise traverses becomes encrypted and can be revived back through a particular
decryption technique involving reverse noise propagation. To make deciphering more complex, the authors introduce
the concept of Windows in this technique. The plain text is given as input by the user. Each character of the text is
converted into its respective ASCII value which in turn is converted into binary bits and stored in the RAM. Introducing
a newline character in a particular position of the binary medium makes the medium rectangular in shape. This position
is stored as the first key of decryption. Noise is not applied directly over the whole medium.
The medium is divided into prime sized windows whose co-ordinates are chosen randomly all over the binary medium.
Each window layer is extracted from the medium and noise is applied at a randomly chosen position, at a randomly
chosen intensity. Noise spreads along the surface layer of the medium affecting all the bits along its path in concentric
circles only inside the medium with diminishing intensity. This window layer is pasted back in the particular position
from where it was lifted. The authors keep the algorithm flexible in a way that the user can choose the number of
windows he/she wants to use to encrypt his/her message. After the ongoing process ends according to the user’s wish,
the bits are converted back into their corresponding ASCII character and send to the intended receiver. The window
layers and the randomly chosen position and intensities is stored as the second key of the system for decryption. The
intended receiver converts the ASCII characters into its corresponding binary digits and store in an array. The receiver
will then apply noise in a reverse manner in those window layers at the particular position and intensity sent as the
second key by the user. After using up the windows as keys the intended receiver gets back the original binary file of the
ASCII code that has been sent and in turn getting back the original text. This method is one of the strongest methods of
encryption, as the key changes after each time and dual key system makes the method un-decipherable for brute forces.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -29
II. GENERAL WORKING OF THE ALGORITHM
III.
Fig: - 01 (Propagation of Noise through the medium)
INPUT PLAIN TEXT MESSAGE AND CONVERT
INTO CORRESPONDNG ASCII VALUES
ASCII VALUES CONVERTED INTO BITS
Message takes a long chained form. Newline Characters
at placed at a random prime position of the chain
continuously until it forms a 2-D structure.
A Prime Sized rectangular window layer of bits is
extracted from a random position of the binary file.
Noise (of random intensity) is applied in that window
layer as shown in Fig.: - 1 at a random position. The
window layer is pasted back into the binary file.
This position is kept as
the first key of the cipher
text.
The window coordinates
along with the noise
coordinates and intensity
are reserved as the second
key of the cipher text.
If the number of windows are less than the optimal
number chosen for the particular set then go back else go
to the next step.
YES
Convert the binary file to its corresponding ASCII value
characters and prepare the key file for the intended
receiver.
NO
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -30
IV. ALGORITHMS
In this section the algorithms for encryption and decryption are discussed.
IV.1 ALGORITHM FOR ENCRYPTION
Step 1: Accept the plain text in the form of a .txt file.
Step 2: Convert each character into its respective ASCII code and store in an array.
Step 3: Randomly choose a number, n such that n > (8*size of the plain text) and n = prime
Step 4: Convert each character into bits.
Step 5: Store it in an array a [] [] such that number of columns of a = n.
Step 6: Randomly generate four numbers n1, n2, n3, n4. //for the window coordinates
Step 7: Here (n3-n1) = prime and (n4-n2) = prime //prime sized window coordinates
Step 8: The origin of the window (x, y) = (n1, n2)
Step 9: if (n1+n3) > (width of a [] []) n3 = n1 – n3 //going the opposite direction to create window
Step 10: if (n2+n4) > (height of a [] []) n4=n2-n4 //the opposite vertical direction as well
Step 11: The end position of the window (x_end, y_end) = (n3, n4)
Step 12: Randomly generate to numbers n5, n6
Step 13: if n5 > (n3 – n1) || n6 > (n4 - n2) goto step-12
Step 14: Origin of noise (x_n, y_n) = (n5, n6)
Step 15: Randomly generate the last number n7
Step 16: if n7! = prime goto step- 15 //radius of noise intensity should be of prime magnitude
Step 17: Radius of noise to be generated r = n7
Step 18: Extract the bits inside the window
Step 19: Store the extracted bits in an array window [] []
Step 20: Let radius = 0, centre of propagation (h, k) = (x_n, y_n) // starting to propagate noise from the source
Step 21: while radius <= r
Step 22: Let r_tmp=radius, x = 0, gap=1 //noise to be propagated densely
Step 23: while x < (r_tmp/√2) //drawing 1/8th
of the circle
Step 24: y= √ (r^2 – x^2) //using circle draw equation
Step 25: complement bit (x+h, y+k) of a [] [] // generating the concentric circles
Step 26: complement bit (x-h, y+k) of a [] []
Step 27: complement bit (x+h, y-k) of a [] []
Step 28: complement bit (y+h, x+k) of a [] []
Step 29: complement bit (y-h, x+k) of a [] []
Step 30: complement bit (y+h, x-k) of a [] []
Step 31: complement bit (x-h, y-k) of a [] []
Step 32: complement bit (y-h, x-k) of a [] []
Step 33: x= x + gap
Step 34: end while //while loop for generating a single circle
Step 35: radius= radius + 1
Step 36: end while //while loop for generating the full intensity noise
Step 37: radius = r+1 //sound propagation inside the rest of the window layer
Step 38: while radius < (width of window [] [])
Step 39: r_tmp = radius, x= 0, gap = 2
Step 40: while x < r_tmp/√2 //drawing 1/8th
of the circle which propagates sparse noise
Step 41: y=√ (r^2 – x^ 2)
Step 42: complement bit (x+h, y+k) of a [] [] // generating the concentric circles
Step 43: complement bit (x-h, y+k) of a [] []
Step 44: complement bit (x+h, y-k) of a [] []
Step 45: complement bit (y+h, x+k) of a [] []
Step 46: complement bit (y-h, x+k) of a [] []
Step 47: complement bit (y+h, x-k) of a [] []
Step 48: complement bit (x-h, y-k) of a [] []
Step 49: complement bit (y-h, x-k) of a [] []
Step 50: x= x + gap
Step 51 end while // for generating each circle
Step 52: radius = radius + 1
Step 53: gap = gap + 1 // decrease the intensity continuously
Step 54: end while //for the overall generation
Step 55: for i=0 to number of rows in window, i=i+1
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -31
Step 56: for j=0 to number of columns in window, j=j+1
Step 57: a [n1+i] [n2+j] = window [i] [j] //paste the window back into the particular position
Step 58: Store n as the first key
Step 59: Store n1, n2, n3, n4, n5, n6, n7 as the second key file for decryption goto step 6 for the optimum number of
times decided according to the size of the message.
Step 60: Convert bits of array a [] [] into bits of corresponding ASCII character
Step 61: Send encrypted text, key1, key2 to the receiver
Step 62: End
IV.2 ALGORITHM FOR DECRYPTION
Step 1: Accept the encrypted file
Step 2: Extract the ASCII characters of the encrypted text file
Step 3: Convert the characters into bits
Step 4: Extract the value of the first key file and store in variable n
Step 5: Store the bits in array a [] [] such that number of columns of a [] [] = n
Step 6: Extract all the set of values in the second key file and insert them into a 1-d array key []
Step 7: Reverse key []
Step 8: for i=0 to (length of key []), i=i+1
Step 9: String str_tmp = key[i] //store the first set of keys
Step 10: Extract each values in the ith index of key []
Step 11: Store all the seven values in different variables n1, n2, n3, n4, n5, n6, n7
Step 12: Let window origin (win_x, win_y) = (n1, n2)
Step 13: Let window end position (end_x, end_y) = (n3, n4)
Step 14: Extract the window bits from array a [] []
Step 15: Store the bits in the array win [] [] //arranging the window layer to apply noise
Step 16: Let centre of propagation of noise (h, k) = (n5, n6)
Step 17: radius of intensity of noise r = n7
Step 18: Let radius = 0 // starting to propagate noise from the source
Step 19: while radius <= r
Step 20: Let r_tmp=radius, x = 0, gap=1 //noise to be propagated densely
Step 21: while x < (r_tmp/√2) //drawing 1/8th
of the circle
Step 22: y= √ (r^2 – x^2) //using circle draw equation
Step 23: complement bit (x+h, y+k) of a [] [] // generating the concentric circles
Step 24: complement bit (x-h, y+k) of a [] []
Step 25: complement bit (x+h, y-k) of a [] []
Step 26: complement bit (y+h, x+k) of a [] []
Step 27: complement bit (y-h, x+k) of a [] []
Step 28: complement bit (y+h, x-k) of a [] []
Step 29: complement bit (x-h, y-k) of a [] []
Step 30: complement bit (y-h, x-k) of a [] []
Step 31: x= x + gap
Step 32: end while //while loop for generating a single circle
Step 33: radius= radius + 1
Step 34: end while //while loop for generating the full intensity noise
Step 35: radius = r+1 //sound propagation inside the rest of the window layer
Step 36: while radius < (width of window [] [])
Step 37: r_tmp = radius, x= 0, gap = 2
Step 38: while x < r_tmp/√2 //drawing 1/8th
of the circle which propagates sparse noise
Step 39: y=√ (r^2 – x^ 2)
Step 40: complement bit (x+h, y+k) of a [] [] // generating the concentric circles
Step 41: complement bit (x-h, y+k) of a [] []
Step 42: complement bit (x+h, y-k) of a [] []
Step 43: complement bit (y+h, x+k) of a [] []
Step 44: complement bit (y-h, x+k) of a [] []
Step 45: complement bit (y+h, x-k) of a [] []
Step 46: complement bit (x-h, y-k) of a [] []
Step 47: complement bit (y-h, x-k) of a [] []
Step 48: x= x + gap
Step 49: end while // for generating each circle
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -32
Step 50: radius = radius + 1
Step 51: gap = gap + 1 // decrease the intensity continuously
Step 52: end while //for the overall generation
Step 53: for ii=0 to number of rows in window, ii=ii+1
Step 54: for j=0 to number of columns in window, j=j+1
Step 55: a [n1+ii] [n2+j] = window [ii] [j] //paste the window back into the particular position
Step 56: end for //for loop rotating the key array to decode the file
Step 57: Array a [] [] contains the bits of the original text
Step 58: Convert the bits into the corresponding ASCII characters
Step 59: End
V. RESULTS AND DISCUSSIONS
We have tested the proposed algorithm against a variety of test cases
TEST CASE 1: - ASCII 0 OF 10 CHARACTERS
Fig -02 (Graph between ASCII 0 Cipher Text after 1st
Execution)
Fig -03(Graph between ASCII 0 Cipher Text after 2nd
Execution)
Fig -04 (Graph between ASCII 0 Cipher Text after 3rd
Execution)
GRAPH 1 FOR ASCII 0
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -33
Fig -05 (Graph between ASCII 0 Cipher Text after 4th
Execution)
TEST CASE 2: - ASCII 1 OF 10 CHARACTERS
Fig -06 (Graph between ASCII 1 Cipher Text after 1st
Execution)
Fig -07 (Graph between ASCII 1 Cipher Text after 2nd
Execution)
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -34
Fig -08 (Graph between ASCII 1 Cipher Text after 3rd
Execution)
Fig -09 (Graph between ASCII 1 Cipher Text after 4th
Execution)
TEST CASE 3: - PLAINDROME WORD CHECK
MESSAGE 1: - MADAM
Fig -10 (Graph between palindromic word “MADAM” and its corresponding Cipher Text)
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -35
MESSAGE 2: - AAAAABBAAAAA
Fig -11 (Graph between palindromic word “AAAAABBAAAAA” and its corresponding Cipher Text)
TEST CASE 4: - TWO SIMILAR LINES ARE TAKEN AS TEST CASES.
Graph between the two lines are shown as the result.
Line 1: - HE IS GOOD
Line 2: - HE IS GOON
Fig -12 (Graph between two almost similar sentences “HE IS GOOD” and “HE IS GOON”)
VI. CONCLUSIONS
The present algorithm used to encrypt data has been used for various files and it has yielded good results. Keeping the
above produced results in mind, it is un-deniable that the algorithm is successful in producing random possibilities for
same messages and intensely different possibilities even when same characters are given as input to the system. Thus, it
is easy to conclude that the message that will be transmitted after flowing through this algorithm will be free from all
brute force attacks, known plain text attack, known cipher text attack, statistical attack securing the most important
information of the user while sending it to the intended receiver. The authors have thought of improvising new
techniques in creation of windows and reducing the overlapping windows by discarding THEM IN the next versions of
the work.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -36
ACKNOWLEDGEMENT
The authors are grateful to Computer Science Department of St. Xavier’s College (Autonomous), Kolkata for giving
them opportunity to do research in Network Security.
REFERENCES
[1] Symmetric Key Cryptography using Random Key generator: Asoke Nath, Saima Ghosh, MeheboobAlamMallik:
“Proceedings of International conference on security and management (SAM’10” held at Las Vegas, USA Jull 12-
15, 2010), Vol-2, Page: 239-244(2010).
[2] A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm,
DriptoChatterjee, JoyshreeNath, SuvadeepDasgupta and AsokeNath : Proceedings of IEEE International
Conference on Communication Systems and Network Technologies, held at SMVDU(Jammu) 03-06 June,2011,
Page-89-94(2011).
[3] Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm:
NJJSAA symmetric key algorithm:NeerajKhanna, Joel James,JoyshreeNath, SayantanChakraborty,
AmlanChakrabarti and AsokeNath : Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011,
Page 125-130(2011).
[4] Symmetric key Cryptography using modified DJSSA symmetric key algorithm, DriptoChatterjee, JoyshreeNath,
Sankar Das, ShalabhAgarwal and AsokeNath, Proceedings of International conference Worldcomp 2011 held at
LasVegas 18-21 July 2011, Page-306-311, Vol-1(2011).
[5] Symmetric key Cryptography using two-way updated – Generalized Vernam Cipher method: TTSJA algorithm,
International Journal of Computer Applications (IJCA, USA), Vol 42, No.1, March, Pg: 34 -39( 2012).
[6] Ultra Encryption Standard(UES) Version-I: Symmetric Key Cryptosystem using generalized modified Vernam
Cipher method, Permutation method and Columnar Transposition method, Satyaki Roy, NavajitMaitra,
JoyshreeNath,ShalabhAgarwal and AsokeNath, Proceedings of IEEE sponsored National Conference on Recent
Advances in Communication, Control and Computing Technology-RACCCT 2012, 29-30 March held at Surat,
Page 81-88(2012)
[7] Advanced Digital Steganography using Encrypted Secret Message and Encrypted Embedded Cover File, Joyshree
Nath, Saima Ghosh and Asoke Nath, International Journal of Computer Applications(IJCA 0975-8887), Vol 46,
No-14, May ,(2012).
[8] Ultra Encryption Standard(UES) Version-II: Symmetric key Cryptosystem using generalized modified vernam
method, permutation method, colum,nar transposition method and TTJSA method, Satyaki Roy, NavajitMoitra,
Joyshree Nath, Shalabh Agarwal and Asoke Nath, Proceedings of International Conference Worldcomp 2012 held
at Las Vegas, USA, FCS-12, Page-97 – 104(2012).
[9] Ultra Encryption Standard(UES) Version-IV: New Symmetric Key Cryptosystem with bit-level columnar
Transposition and Reshuffling of Bits, Satyaki Roy, Navajit Maitra, Joyshree Nath, Shalabh Agarwal and Asoke
Nath, International Journal of Computer Applications(IJCA)(0975-8887) USA Volume 51-No.1.,Aug, Page. 28-
35(2012).
[10] Bit Level Encryption Standard (BLES) : Version-I, Neeraj Khanna, Dripto Chatterjee, Joyshree Nath and
AsokeNath, International Journal of Computer Applications(IJCA)(0975-8887) USA Volume 52-No.2.,Aug,
Page.41-46(2012).
[11] Bit Level Encryption Standard(BLES) : Versiob-II, GauravBhadra, Tanya Bala, Samaik Banik, Joyshree Nath and
Asoke Nath, Proceedings of IEEE International Conference WICT-2012 held at IIITM-K, Trivandrum Oct 30 to
Nov 1, 2012, Page No. 121- 127(2012).
[12] Modern Encryption Standard(MES) version-I : An Advanced Cryptographic Method, Somdip Dey, Asoke Nath,
Proceedings of IEEE International Conference WICT- 2012 held at IIITM-K, Trivandrum Oct 30 to Nov 1, 2012,
Page No. 242-247(2012).
[13] Asoke Nath, Bit Level Generalized Modified Vernam Cipher Method with Feedback, International Journal of
Advanced Computer Research (ISSN(print):2249- 7277 ISSN(online): 2277-7970), Volume-2, Number-4 Issue-6,
Page-24-30, Dec(2012).
[14] Bit Level Encryption Standard (BLES): Ver-III, Gaurav Bhadra, Tanya Bala, Samik Banik, Joyshree Nath, Asoke
Nath, Proceedings of International Conference Worldcomp 2013 held at Las Vegas, USA in Jul 22-25, 2013.
Proceedings page 99-105(2013).
[15] Advanced Symmetric Key Cryptosystem using Bit and Byte Level Encryption Methods with Feedback dvanced
Symmetric Key Cryptosystem using Bit and Byte Level Encryption methods with Feedback, Prabal Banerjee,
Asoke Nath, Proceedings of InInternational Conference Worldcomp 2013 held at Las Vegas, USA in Jul 22-25,
2013.Proceedings Page 120-126(2013).
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763
Issue 12, Volume 2 (December 2015) www.ijirae.com
_________________________________________________________________________________________________
IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57
© 2014- 15, IJIRAE- All Rights Reserved Page -37
[16] Multi Way Feedback Encryption Standard Ver-3(MWFES-3), Asoke Nath, Debdeep Basu, Ankita Bose, Saptarshi
Chatterjee, Surajit Bhowmik published in IEEE conference proceedings: WICT-2013 held at Hanoi in Dec 14-
18(2013), page 318-325(2013).
[17] Multi Way Feedback Encryption Standard Ver-2(MWFES-2), Asoke Nath, Debdeep Basu, Ankita Bose, Saptarshi
Chatterjee, Surojit Bhowmik , International Journal of Advanced Computer Research(IJACR), Vol 3, Number-1,
Issue-13, Page-29-35, Dec(2013).
[18] Ankita Basu, Debdeep Basu, Saptarshi Chatterjee, Asoke Nath, Surajit Bhowmik, Bit Level Multi Way Feedback
Encryption Standard Ver-1(BLMWFES-1), published in Proceedings of IEEE conference CSNT-2014 held at
Bhopal, page-601-605, April 7(2014).page-793-799, April 7(2014).
[19] Asoke Nath , Bit level Multi Way Feedback Encryption Standard Ver- 2(BLMWFES-2) , proceedings of
International IEEE conference Advanced Communication, Control & Computing Technologies(ICACCCT) 2014
held at Syed Ammal Engineering College, Page 1702-1707(2014).
[20] Arijit Ghosh, PrabhakarChakraborty, AsokeNath, ShamindraParui, ―3d Multi Way Feedback Encryption Standard
Version I(3dMWFES-1), International Journal of Advance Research in Computer Science and Management
Studies, ISSN:2321-7782(Online), Vol 2, Issue 10,Oct, Page:206-218(2014).
[21] Arijit Ghosh, Prabhakar Chakraborty, Asoke Nath, “3d Multi Way Feedback Encryption Standard Version
II(3dMWFES-II)”, International Journal of Computer Science and Information Technologies(IJCSIT), Vol.6(3),
Page 2990-2997(June 2015).
[22] Asoke Nath, Ranjini Mukherjee, Dona Sarkar, Chaitali Patra, “2-Dimensional Multi Way Feedback Encryption
Standard Version-1(2dMWFES-1)”, International Journal of Innovative Research in Computer and Communication
Engineering (IJIRCCE), Vol-3, Issue 6, Page 5024-5033(30-th June 2015).

More Related Content

Viewers also liked

Chapman_BrandBook_2015-2
Chapman_BrandBook_2015-2Chapman_BrandBook_2015-2
Chapman_BrandBook_2015-2Kimberley Ward
 
Box connector Mule ESB Integration
Box connector Mule ESB IntegrationBox connector Mule ESB Integration
Box connector Mule ESB IntegrationKrishnakanth Goud
 
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...AM Publications
 
You earn 1%~4% per day of your investment (150%)
You earn 1%~4% per day of your investment  (150%)You earn 1%~4% per day of your investment  (150%)
You earn 1%~4% per day of your investment (150%)Hicham Earn
 
Top 5 admin officer cover letter samples
Top 5 admin officer cover letter samplesTop 5 admin officer cover letter samples
Top 5 admin officer cover letter samplesdonriferi
 
A film formanyelve
A film formanyelveA film formanyelve
A film formanyelvefodz3634
 
ESDS_Corporate_Presentation
ESDS_Corporate_PresentationESDS_Corporate_Presentation
ESDS_Corporate_PresentationPravin Rahane
 
Tecnicas de Intregacion Robinson
Tecnicas de Intregacion RobinsonTecnicas de Intregacion Robinson
Tecnicas de Intregacion Robinsonrobinsonduran15
 
If you’ve ever wondered what happens at the moment that an astronaut’s return...
If you’ve ever wondered what happens at the moment that an astronaut’s return...If you’ve ever wondered what happens at the moment that an astronaut’s return...
If you’ve ever wondered what happens at the moment that an astronaut’s return...Aba Nguyễn
 

Viewers also liked (17)

Chapman_BrandBook_2015-2
Chapman_BrandBook_2015-2Chapman_BrandBook_2015-2
Chapman_BrandBook_2015-2
 
Paradise3magazine.doc
Paradise3magazine.docParadise3magazine.doc
Paradise3magazine.doc
 
Dt learn
Dt learnDt learn
Dt learn
 
Box connector Mule ESB Integration
Box connector Mule ESB IntegrationBox connector Mule ESB Integration
Box connector Mule ESB Integration
 
140210106015
140210106015140210106015
140210106015
 
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
 
You earn 1%~4% per day of your investment (150%)
You earn 1%~4% per day of your investment  (150%)You earn 1%~4% per day of your investment  (150%)
You earn 1%~4% per day of your investment (150%)
 
Top 5 admin officer cover letter samples
Top 5 admin officer cover letter samplesTop 5 admin officer cover letter samples
Top 5 admin officer cover letter samples
 
A film formanyelve
A film formanyelveA film formanyelve
A film formanyelve
 
Fases de un proyecto
Fases de un proyectoFases de un proyecto
Fases de un proyecto
 
ESDS_Corporate_Presentation
ESDS_Corporate_PresentationESDS_Corporate_Presentation
ESDS_Corporate_Presentation
 
5 things which trigger heartburn
5 things which trigger heartburn5 things which trigger heartburn
5 things which trigger heartburn
 
Decisiones que se deben tomar en un proyecto
Decisiones que se deben tomar en un proyectoDecisiones que se deben tomar en un proyecto
Decisiones que se deben tomar en un proyecto
 
Ghar ka khaana
Ghar ka khaanaGhar ka khaana
Ghar ka khaana
 
Ortho conf
Ortho confOrtho conf
Ortho conf
 
Tecnicas de Intregacion Robinson
Tecnicas de Intregacion RobinsonTecnicas de Intregacion Robinson
Tecnicas de Intregacion Robinson
 
If you’ve ever wondered what happens at the moment that an astronaut’s return...
If you’ve ever wondered what happens at the moment that an astronaut’s return...If you’ve ever wondered what happens at the moment that an astronaut’s return...
If you’ve ever wondered what happens at the moment that an astronaut’s return...
 

Similar to Noise Driven Encryption Algorithm (NDEA) Version-1

A new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternsA new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternseSAT Journals
 
Design of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsDesign of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsAM Publications
 
A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...eSAT Journals
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos basedeSAT Publishing House
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...Editor IJCATR
 
A new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programmingA new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programmingcsandit
 
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMINGA NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMINGcscpconf
 
Low Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained DevicesLow Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained DevicesCSCJournals
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET Journal
 
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...IJERA Editor
 
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...IRJET Journal
 
Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingIRJET Journal
 
Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...eSAT Journals
 
Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...eSAT Publishing House
 
IRJET - Multi-Key Privacy in Cloud Computing
IRJET -  	  Multi-Key Privacy in Cloud ComputingIRJET -  	  Multi-Key Privacy in Cloud Computing
IRJET - Multi-Key Privacy in Cloud ComputingIRJET Journal
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...eSAT Publishing House
 
Secured key exchange by information reconciliation
Secured key exchange by information reconciliationSecured key exchange by information reconciliation
Secured key exchange by information reconciliationeSAT Publishing House
 
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudSecure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudIRJET Journal
 

Similar to Noise Driven Encryption Algorithm (NDEA) Version-1 (20)

A new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternsA new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patterns
 
Design of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsDesign of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic Mathematics
 
A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos based
 
D44091720
D44091720D44091720
D44091720
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
 
A new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programmingA new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programming
 
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMINGA NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
 
Low Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained DevicesLow Power Elliptic Curve Digital Signature Design for Constrained Devices
Low Power Elliptic Curve Digital Signature Design for Constrained Devices
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
 
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
An Efficient Frame Embedding Using Haar Wavelet Coefficients And Orthogonal C...
 
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
IRJET- Image Encryption based on Non-Subsampled Contourlet Transform with Dif...
 
Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language Processing
 
Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...
 
Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...Analysis of image compression algorithms using wavelet transform with gui in ...
Analysis of image compression algorithms using wavelet transform with gui in ...
 
IRJET - Multi-Key Privacy in Cloud Computing
IRJET -  	  Multi-Key Privacy in Cloud ComputingIRJET -  	  Multi-Key Privacy in Cloud Computing
IRJET - Multi-Key Privacy in Cloud Computing
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
 
Secured key exchange by information reconciliation
Secured key exchange by information reconciliationSecured key exchange by information reconciliation
Secured key exchange by information reconciliation
 
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On CloudSecure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
Secure Text Transfer Using Diffie-Hellman Key Exchange Based On Cloud
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKAM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube ExchangerAnamika Sarkar
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ï»żTube Exchanger
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 

Noise Driven Encryption Algorithm (NDEA) Version-1

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -28 Noise Driven Encryption Algorithm (NDEA) Version-1 Aashijit Mukhopadhyay Somnath Saha Naved Ahmed Tagala Asoke Nath St. Xavier’s College St. Xavier’s College St. Xavier’s College St. Xavier’s College (Autonomous) (Autonomous) (Autonomous) (Autonomous) Kolkata Kolkata Kolkata Kolkata Abstract— In the present paper the authors introduced an algorithm for encrypting useful data at bit level. The authors have used a new technique of introducing noise wave over the bit patterns of the plain text to encrypt it. Noise has been defined as the complement of the present bit pattern. Certain window layers have been selected over the bit patterns and noise wave has been made to propagate over those pattern in concentric circular fashion thus encrypting the whole bit text present. Windows are picked up from the bit patterns randomly and noise wave is made to propagate from any random position with a random intensity. Noise propagates inside the medium with decreased intensity as one move farther from the source of noise using natural laws. The method has been applied on some standard text and the output has been found to be totally unpredictable. The method can be used to encrypt OTP (One Time Password) and other bank transactions. Keywords— Noise, Plain Text, Encryption, Decryption, AFES I. INTRODUCTION With the advancement of internet technologies, information flow over the internet has increased manifold. Due to the extensive information flow, the security of each bit of the information becomes very vital. The main applications of secured data transfer are in money transfer applications. Online banking has been the most important sector of fund transfer. During fund transfer, vital information such as the pin of the user is present in the network for a considerable period of time. This information must be properly encrypted in order to secure this vital information from the hackers. The algorithm AFES-1 that has been recently proposed has been a great help for the logical birth of the present algorithm. In AFES-1, the Plain Text is converted to its corresponding bits and stored in a square matrix of size equal to the integral square root of the number of bits. The residual bits remain untouched. Then the bits are arranged by calling 24 different shifting functions. Now, the order of calling the 24 functions change at each iteration and that order is taken as a function of the keypad. The bits extracted from the above algorithm are then encrypted more using MWFES-3. This algorithm has been found to be very useful against any brute force attack. In the present paper, the authors have suggested a new technique where concentric propagation of noise over the useful data is used as the prime authority of the method. Now the medium through which the noise traverses becomes encrypted and can be revived back through a particular decryption technique involving reverse noise propagation. To make deciphering more complex, the authors introduce the concept of Windows in this technique. The plain text is given as input by the user. Each character of the text is converted into its respective ASCII value which in turn is converted into binary bits and stored in the RAM. Introducing a newline character in a particular position of the binary medium makes the medium rectangular in shape. This position is stored as the first key of decryption. Noise is not applied directly over the whole medium. The medium is divided into prime sized windows whose co-ordinates are chosen randomly all over the binary medium. Each window layer is extracted from the medium and noise is applied at a randomly chosen position, at a randomly chosen intensity. Noise spreads along the surface layer of the medium affecting all the bits along its path in concentric circles only inside the medium with diminishing intensity. This window layer is pasted back in the particular position from where it was lifted. The authors keep the algorithm flexible in a way that the user can choose the number of windows he/she wants to use to encrypt his/her message. After the ongoing process ends according to the user’s wish, the bits are converted back into their corresponding ASCII character and send to the intended receiver. The window layers and the randomly chosen position and intensities is stored as the second key of the system for decryption. The intended receiver converts the ASCII characters into its corresponding binary digits and store in an array. The receiver will then apply noise in a reverse manner in those window layers at the particular position and intensity sent as the second key by the user. After using up the windows as keys the intended receiver gets back the original binary file of the ASCII code that has been sent and in turn getting back the original text. This method is one of the strongest methods of encryption, as the key changes after each time and dual key system makes the method un-decipherable for brute forces.
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -29 II. GENERAL WORKING OF THE ALGORITHM III. Fig: - 01 (Propagation of Noise through the medium) INPUT PLAIN TEXT MESSAGE AND CONVERT INTO CORRESPONDNG ASCII VALUES ASCII VALUES CONVERTED INTO BITS Message takes a long chained form. Newline Characters at placed at a random prime position of the chain continuously until it forms a 2-D structure. A Prime Sized rectangular window layer of bits is extracted from a random position of the binary file. Noise (of random intensity) is applied in that window layer as shown in Fig.: - 1 at a random position. The window layer is pasted back into the binary file. This position is kept as the first key of the cipher text. The window coordinates along with the noise coordinates and intensity are reserved as the second key of the cipher text. If the number of windows are less than the optimal number chosen for the particular set then go back else go to the next step. YES Convert the binary file to its corresponding ASCII value characters and prepare the key file for the intended receiver. NO
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -30 IV. ALGORITHMS In this section the algorithms for encryption and decryption are discussed. IV.1 ALGORITHM FOR ENCRYPTION Step 1: Accept the plain text in the form of a .txt file. Step 2: Convert each character into its respective ASCII code and store in an array. Step 3: Randomly choose a number, n such that n > (8*size of the plain text) and n = prime Step 4: Convert each character into bits. Step 5: Store it in an array a [] [] such that number of columns of a = n. Step 6: Randomly generate four numbers n1, n2, n3, n4. //for the window coordinates Step 7: Here (n3-n1) = prime and (n4-n2) = prime //prime sized window coordinates Step 8: The origin of the window (x, y) = (n1, n2) Step 9: if (n1+n3) > (width of a [] []) n3 = n1 – n3 //going the opposite direction to create window Step 10: if (n2+n4) > (height of a [] []) n4=n2-n4 //the opposite vertical direction as well Step 11: The end position of the window (x_end, y_end) = (n3, n4) Step 12: Randomly generate to numbers n5, n6 Step 13: if n5 > (n3 – n1) || n6 > (n4 - n2) goto step-12 Step 14: Origin of noise (x_n, y_n) = (n5, n6) Step 15: Randomly generate the last number n7 Step 16: if n7! = prime goto step- 15 //radius of noise intensity should be of prime magnitude Step 17: Radius of noise to be generated r = n7 Step 18: Extract the bits inside the window Step 19: Store the extracted bits in an array window [] [] Step 20: Let radius = 0, centre of propagation (h, k) = (x_n, y_n) // starting to propagate noise from the source Step 21: while radius <= r Step 22: Let r_tmp=radius, x = 0, gap=1 //noise to be propagated densely Step 23: while x < (r_tmp/√2) //drawing 1/8th of the circle Step 24: y= √ (r^2 – x^2) //using circle draw equation Step 25: complement bit (x+h, y+k) of a [] [] // generating the concentric circles Step 26: complement bit (x-h, y+k) of a [] [] Step 27: complement bit (x+h, y-k) of a [] [] Step 28: complement bit (y+h, x+k) of a [] [] Step 29: complement bit (y-h, x+k) of a [] [] Step 30: complement bit (y+h, x-k) of a [] [] Step 31: complement bit (x-h, y-k) of a [] [] Step 32: complement bit (y-h, x-k) of a [] [] Step 33: x= x + gap Step 34: end while //while loop for generating a single circle Step 35: radius= radius + 1 Step 36: end while //while loop for generating the full intensity noise Step 37: radius = r+1 //sound propagation inside the rest of the window layer Step 38: while radius < (width of window [] []) Step 39: r_tmp = radius, x= 0, gap = 2 Step 40: while x < r_tmp/√2 //drawing 1/8th of the circle which propagates sparse noise Step 41: y=√ (r^2 – x^ 2) Step 42: complement bit (x+h, y+k) of a [] [] // generating the concentric circles Step 43: complement bit (x-h, y+k) of a [] [] Step 44: complement bit (x+h, y-k) of a [] [] Step 45: complement bit (y+h, x+k) of a [] [] Step 46: complement bit (y-h, x+k) of a [] [] Step 47: complement bit (y+h, x-k) of a [] [] Step 48: complement bit (x-h, y-k) of a [] [] Step 49: complement bit (y-h, x-k) of a [] [] Step 50: x= x + gap Step 51 end while // for generating each circle Step 52: radius = radius + 1 Step 53: gap = gap + 1 // decrease the intensity continuously Step 54: end while //for the overall generation Step 55: for i=0 to number of rows in window, i=i+1
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -31 Step 56: for j=0 to number of columns in window, j=j+1 Step 57: a [n1+i] [n2+j] = window [i] [j] //paste the window back into the particular position Step 58: Store n as the first key Step 59: Store n1, n2, n3, n4, n5, n6, n7 as the second key file for decryption goto step 6 for the optimum number of times decided according to the size of the message. Step 60: Convert bits of array a [] [] into bits of corresponding ASCII character Step 61: Send encrypted text, key1, key2 to the receiver Step 62: End IV.2 ALGORITHM FOR DECRYPTION Step 1: Accept the encrypted file Step 2: Extract the ASCII characters of the encrypted text file Step 3: Convert the characters into bits Step 4: Extract the value of the first key file and store in variable n Step 5: Store the bits in array a [] [] such that number of columns of a [] [] = n Step 6: Extract all the set of values in the second key file and insert them into a 1-d array key [] Step 7: Reverse key [] Step 8: for i=0 to (length of key []), i=i+1 Step 9: String str_tmp = key[i] //store the first set of keys Step 10: Extract each values in the ith index of key [] Step 11: Store all the seven values in different variables n1, n2, n3, n4, n5, n6, n7 Step 12: Let window origin (win_x, win_y) = (n1, n2) Step 13: Let window end position (end_x, end_y) = (n3, n4) Step 14: Extract the window bits from array a [] [] Step 15: Store the bits in the array win [] [] //arranging the window layer to apply noise Step 16: Let centre of propagation of noise (h, k) = (n5, n6) Step 17: radius of intensity of noise r = n7 Step 18: Let radius = 0 // starting to propagate noise from the source Step 19: while radius <= r Step 20: Let r_tmp=radius, x = 0, gap=1 //noise to be propagated densely Step 21: while x < (r_tmp/√2) //drawing 1/8th of the circle Step 22: y= √ (r^2 – x^2) //using circle draw equation Step 23: complement bit (x+h, y+k) of a [] [] // generating the concentric circles Step 24: complement bit (x-h, y+k) of a [] [] Step 25: complement bit (x+h, y-k) of a [] [] Step 26: complement bit (y+h, x+k) of a [] [] Step 27: complement bit (y-h, x+k) of a [] [] Step 28: complement bit (y+h, x-k) of a [] [] Step 29: complement bit (x-h, y-k) of a [] [] Step 30: complement bit (y-h, x-k) of a [] [] Step 31: x= x + gap Step 32: end while //while loop for generating a single circle Step 33: radius= radius + 1 Step 34: end while //while loop for generating the full intensity noise Step 35: radius = r+1 //sound propagation inside the rest of the window layer Step 36: while radius < (width of window [] []) Step 37: r_tmp = radius, x= 0, gap = 2 Step 38: while x < r_tmp/√2 //drawing 1/8th of the circle which propagates sparse noise Step 39: y=√ (r^2 – x^ 2) Step 40: complement bit (x+h, y+k) of a [] [] // generating the concentric circles Step 41: complement bit (x-h, y+k) of a [] [] Step 42: complement bit (x+h, y-k) of a [] [] Step 43: complement bit (y+h, x+k) of a [] [] Step 44: complement bit (y-h, x+k) of a [] [] Step 45: complement bit (y+h, x-k) of a [] [] Step 46: complement bit (x-h, y-k) of a [] [] Step 47: complement bit (y-h, x-k) of a [] [] Step 48: x= x + gap Step 49: end while // for generating each circle
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -32 Step 50: radius = radius + 1 Step 51: gap = gap + 1 // decrease the intensity continuously Step 52: end while //for the overall generation Step 53: for ii=0 to number of rows in window, ii=ii+1 Step 54: for j=0 to number of columns in window, j=j+1 Step 55: a [n1+ii] [n2+j] = window [ii] [j] //paste the window back into the particular position Step 56: end for //for loop rotating the key array to decode the file Step 57: Array a [] [] contains the bits of the original text Step 58: Convert the bits into the corresponding ASCII characters Step 59: End V. RESULTS AND DISCUSSIONS We have tested the proposed algorithm against a variety of test cases TEST CASE 1: - ASCII 0 OF 10 CHARACTERS Fig -02 (Graph between ASCII 0 Cipher Text after 1st Execution) Fig -03(Graph between ASCII 0 Cipher Text after 2nd Execution) Fig -04 (Graph between ASCII 0 Cipher Text after 3rd Execution) GRAPH 1 FOR ASCII 0
  • 6. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -33 Fig -05 (Graph between ASCII 0 Cipher Text after 4th Execution) TEST CASE 2: - ASCII 1 OF 10 CHARACTERS Fig -06 (Graph between ASCII 1 Cipher Text after 1st Execution) Fig -07 (Graph between ASCII 1 Cipher Text after 2nd Execution)
  • 7. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -34 Fig -08 (Graph between ASCII 1 Cipher Text after 3rd Execution) Fig -09 (Graph between ASCII 1 Cipher Text after 4th Execution) TEST CASE 3: - PLAINDROME WORD CHECK MESSAGE 1: - MADAM Fig -10 (Graph between palindromic word “MADAM” and its corresponding Cipher Text)
  • 8. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -35 MESSAGE 2: - AAAAABBAAAAA Fig -11 (Graph between palindromic word “AAAAABBAAAAA” and its corresponding Cipher Text) TEST CASE 4: - TWO SIMILAR LINES ARE TAKEN AS TEST CASES. Graph between the two lines are shown as the result. Line 1: - HE IS GOOD Line 2: - HE IS GOON Fig -12 (Graph between two almost similar sentences “HE IS GOOD” and “HE IS GOON”) VI. CONCLUSIONS The present algorithm used to encrypt data has been used for various files and it has yielded good results. Keeping the above produced results in mind, it is un-deniable that the algorithm is successful in producing random possibilities for same messages and intensely different possibilities even when same characters are given as input to the system. Thus, it is easy to conclude that the message that will be transmitted after flowing through this algorithm will be free from all brute force attacks, known plain text attack, known cipher text attack, statistical attack securing the most important information of the user while sending it to the intended receiver. The authors have thought of improvising new techniques in creation of windows and reducing the overlapping windows by discarding THEM IN the next versions of the work.
  • 9. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -36 ACKNOWLEDGEMENT The authors are grateful to Computer Science Department of St. Xavier’s College (Autonomous), Kolkata for giving them opportunity to do research in Network Security. REFERENCES [1] Symmetric Key Cryptography using Random Key generator: Asoke Nath, Saima Ghosh, MeheboobAlamMallik: “Proceedings of International conference on security and management (SAM’10” held at Las Vegas, USA Jull 12- 15, 2010), Vol-2, Page: 239-244(2010). [2] A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm, DriptoChatterjee, JoyshreeNath, SuvadeepDasgupta and AsokeNath : Proceedings of IEEE International Conference on Communication Systems and Network Technologies, held at SMVDU(Jammu) 03-06 June,2011, Page-89-94(2011). [3] Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm:NeerajKhanna, Joel James,JoyshreeNath, SayantanChakraborty, AmlanChakrabarti and AsokeNath : Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130(2011). [4] Symmetric key Cryptography using modified DJSSA symmetric key algorithm, DriptoChatterjee, JoyshreeNath, Sankar Das, ShalabhAgarwal and AsokeNath, Proceedings of International conference Worldcomp 2011 held at LasVegas 18-21 July 2011, Page-306-311, Vol-1(2011). [5] Symmetric key Cryptography using two-way updated – Generalized Vernam Cipher method: TTSJA algorithm, International Journal of Computer Applications (IJCA, USA), Vol 42, No.1, March, Pg: 34 -39( 2012). [6] Ultra Encryption Standard(UES) Version-I: Symmetric Key Cryptosystem using generalized modified Vernam Cipher method, Permutation method and Columnar Transposition method, Satyaki Roy, NavajitMaitra, JoyshreeNath,ShalabhAgarwal and AsokeNath, Proceedings of IEEE sponsored National Conference on Recent Advances in Communication, Control and Computing Technology-RACCCT 2012, 29-30 March held at Surat, Page 81-88(2012) [7] Advanced Digital Steganography using Encrypted Secret Message and Encrypted Embedded Cover File, Joyshree Nath, Saima Ghosh and Asoke Nath, International Journal of Computer Applications(IJCA 0975-8887), Vol 46, No-14, May ,(2012). [8] Ultra Encryption Standard(UES) Version-II: Symmetric key Cryptosystem using generalized modified vernam method, permutation method, colum,nar transposition method and TTJSA method, Satyaki Roy, NavajitMoitra, Joyshree Nath, Shalabh Agarwal and Asoke Nath, Proceedings of International Conference Worldcomp 2012 held at Las Vegas, USA, FCS-12, Page-97 – 104(2012). [9] Ultra Encryption Standard(UES) Version-IV: New Symmetric Key Cryptosystem with bit-level columnar Transposition and Reshuffling of Bits, Satyaki Roy, Navajit Maitra, Joyshree Nath, Shalabh Agarwal and Asoke Nath, International Journal of Computer Applications(IJCA)(0975-8887) USA Volume 51-No.1.,Aug, Page. 28- 35(2012). [10] Bit Level Encryption Standard (BLES) : Version-I, Neeraj Khanna, Dripto Chatterjee, Joyshree Nath and AsokeNath, International Journal of Computer Applications(IJCA)(0975-8887) USA Volume 52-No.2.,Aug, Page.41-46(2012). [11] Bit Level Encryption Standard(BLES) : Versiob-II, GauravBhadra, Tanya Bala, Samaik Banik, Joyshree Nath and Asoke Nath, Proceedings of IEEE International Conference WICT-2012 held at IIITM-K, Trivandrum Oct 30 to Nov 1, 2012, Page No. 121- 127(2012). [12] Modern Encryption Standard(MES) version-I : An Advanced Cryptographic Method, Somdip Dey, Asoke Nath, Proceedings of IEEE International Conference WICT- 2012 held at IIITM-K, Trivandrum Oct 30 to Nov 1, 2012, Page No. 242-247(2012). [13] Asoke Nath, Bit Level Generalized Modified Vernam Cipher Method with Feedback, International Journal of Advanced Computer Research (ISSN(print):2249- 7277 ISSN(online): 2277-7970), Volume-2, Number-4 Issue-6, Page-24-30, Dec(2012). [14] Bit Level Encryption Standard (BLES): Ver-III, Gaurav Bhadra, Tanya Bala, Samik Banik, Joyshree Nath, Asoke Nath, Proceedings of International Conference Worldcomp 2013 held at Las Vegas, USA in Jul 22-25, 2013. Proceedings page 99-105(2013). [15] Advanced Symmetric Key Cryptosystem using Bit and Byte Level Encryption Methods with Feedback dvanced Symmetric Key Cryptosystem using Bit and Byte Level Encryption methods with Feedback, Prabal Banerjee, Asoke Nath, Proceedings of InInternational Conference Worldcomp 2013 held at Las Vegas, USA in Jul 22-25, 2013.Proceedings Page 120-126(2013).
  • 10. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2763 Issue 12, Volume 2 (December 2015) www.ijirae.com _________________________________________________________________________________________________ IJIRAE: Impact Factor Value - ISRAJIF: 1.857 | PIF: 2.469 | Jour Info: 4.085 | Index Copernicus 2014 = 6.57 © 2014- 15, IJIRAE- All Rights Reserved Page -37 [16] Multi Way Feedback Encryption Standard Ver-3(MWFES-3), Asoke Nath, Debdeep Basu, Ankita Bose, Saptarshi Chatterjee, Surajit Bhowmik published in IEEE conference proceedings: WICT-2013 held at Hanoi in Dec 14- 18(2013), page 318-325(2013). [17] Multi Way Feedback Encryption Standard Ver-2(MWFES-2), Asoke Nath, Debdeep Basu, Ankita Bose, Saptarshi Chatterjee, Surojit Bhowmik , International Journal of Advanced Computer Research(IJACR), Vol 3, Number-1, Issue-13, Page-29-35, Dec(2013). [18] Ankita Basu, Debdeep Basu, Saptarshi Chatterjee, Asoke Nath, Surajit Bhowmik, Bit Level Multi Way Feedback Encryption Standard Ver-1(BLMWFES-1), published in Proceedings of IEEE conference CSNT-2014 held at Bhopal, page-601-605, April 7(2014).page-793-799, April 7(2014). [19] Asoke Nath , Bit level Multi Way Feedback Encryption Standard Ver- 2(BLMWFES-2) , proceedings of International IEEE conference Advanced Communication, Control & Computing Technologies(ICACCCT) 2014 held at Syed Ammal Engineering College, Page 1702-1707(2014). [20] Arijit Ghosh, PrabhakarChakraborty, AsokeNath, ShamindraParui, ―3d Multi Way Feedback Encryption Standard Version I(3dMWFES-1), International Journal of Advance Research in Computer Science and Management Studies, ISSN:2321-7782(Online), Vol 2, Issue 10,Oct, Page:206-218(2014). [21] Arijit Ghosh, Prabhakar Chakraborty, Asoke Nath, “3d Multi Way Feedback Encryption Standard Version II(3dMWFES-II)”, International Journal of Computer Science and Information Technologies(IJCSIT), Vol.6(3), Page 2990-2997(June 2015). [22] Asoke Nath, Ranjini Mukherjee, Dona Sarkar, Chaitali Patra, “2-Dimensional Multi Way Feedback Encryption Standard Version-1(2dMWFES-1)”, International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol-3, Issue 6, Page 5024-5033(30-th June 2015).