SlideShare a Scribd company logo
1 of 5
Download to read offline
© 2022, AJCSE. All Rights Reserved 53
RESEARCH ARTICLE
Data Communication Using Cryptography Encryption
K. Suganya, S. Nethra, S. S. Dhanyaa, D. Sudharson
Department of Artificial Intelligence and Data Science, Kumaraguru College of Technology, Coimbatore,
Tamil Nadu, India
Received on: 12/02/2022; Revised on: 30/03/2022; Accepted on: 15/04/2022
ABSTRACT
The massive rise of this technology will be critical in the future years. All types of data that exist in
the cloud are private to each and every one which can be easily pirated by an attacker when it is sent
to the receiver. The desire for honesty, intimacy, solidity, seclusion, and the necessary methods for
manipulation are heightened. The below-mentioned article briefly introduces cryptographic methods
and a new method of cryptographic algorithms to secure data which improve the security of information
that prevents the application in computing of cloud from piracy.
Key words: Cloud computing, Decipher, Encipher
INTRODUCTION
One of the most crucial aspects of today’s society is
data protection. Cryptography is nothing but writing
the text secretly. It is a technique which assures the
secrecy of the users’data.[1,2]
Cryptography protects
a customer’s or company’s data by switching it
to a form that is legible but incomprehensible to
unauthorized persons and then turning it again
to a format that is readable only with qualified
individuals. Figure 1 represents the process of
cryptography. An encipher technique that translates
the plaintext into another format, called an encipher
key ciphertext, and changes the ciphertext into
plaintext with the help of identical encipher key or a
distinct encipher key depending on methodologies
which is being helpful in encryption of data.
TYPES OF CRYPTOGRAPHY
Crypto uses a method of encryption (nothing
but turning original data to encrypted data) and
decryption (transforming back to original data).
There are different types of encipher and decipher,
yet the vastly practiced methodologies are listed.
SYMMETRICKEY ENCRYPTION
Using symmetric key cryptographic technique,
encryption and decryption of original text can
Address for correspondence:
D. Sudharson
E-mail: sudharsondorai.ads@kct.ac.in
be done using a unique key. Both the clients
should know the keys; therefore, they can read
or write the data. Figure 2 explains the working
of symmetric key Cryptography. Data Encryption
Standard, Advanced Encryption Standard, Triple
Data Encryption Standard, and other symmetric
key algorithms are among them.[3,4]
ASYMMETRIC KEY CRYPTOGRAPHY
Using this approach of cryptographic technique,
decryption and encryption of original text can be
done using exceptional keys. Public key is a key
which is being used to encipher the information
and private key is a key which is being used to
decipher the information.[5]
These keys are distinct
from one another. Recipient has the availability
only to the private key. Figure 3 explains the
working of Asymmetric key Cryptography.
LITERATURE REVIEW
1. “Effective Encipher Schemes in Crypto
ImprovedSecurity”isofferedbyReemaGupta.
The study encourages encryption while also
examining its limitations and methods.[6]
Also
addressed various transpositional strategies
such as simple columnar and row Route
Cipher transposition and so on.[7]
2. “A Revolutionary Rsa Algorithm of
CryptographicAlgorithm with High Efficiency
for Data Security” is offered by Suyash Verma
Available Online at www.ajcse.info
Asian Journal of Computer Science Engineering 2022;7(2):53-57
ISSN 2581 – 3781
Suganya, et al.: Data communication using cryptography encryption
AJCSE/Apr-Jun-2022/Vol 7/Issue 2 54
and colleagues. The cryptography technique
proposed by him is quicker than the existing
one. They arrived at their conclusion by
analyzing various simple texts in about the
same key (DPSK) method.[8,9]
3. “A Reliable Crypto method for Protecting
text messages against Cryptanalytic Attacks
and Brute Force.”[10]
The report explains how
Brute force attacks can be protected using the
schemes of cryptography.
4. “CryptographyandNetworkSecurity,”evaluated
by Daniel L Calloway, equates and distinguishes
studies based on past articles in trend patterns.
5. “A Symmetric Key Cryptographic Algorithm”
was postulated by Ayushi. Ayushi launched two
kindsofdataencryptionalgorithms,asymmetric
and symmetric key.[11]
In addition, a dynamic
cryptographic technique was developed by her.
To convert clear text to encrypted message, she
employed keys equal to or larger than 1000, as
well as binary and algebraic operations.
PROBLEM STATEMENT
Nowadays, data transmission is not trustworthy.
Transmission of data from one server to another
server can be sometimes easily cracked or
modified.[12]
External organizations meddling with
transmitting data leads in loss of data or excess of
data. Hence, we have tried to find a way to send
data in a more secure way.[13]
PROPOSED FRAMEWORK
Symmetric approach
Symmetrickeyencodingrequiresminimalruntime,
and it is always simple to execute in application
scenarios; however, their disadvantage is key’s
security must be moved in both the clients. This
method emphasizes progressing the conventional
encryption technology by employing the
substitution technique. The first separate character
in this suggested technique is transformed into its
corresponding ASCII code valuation, as well as
further cryptography is accomplished.[14,15]
Encryption methodology
1. ASCII value must be assigned to all the unique
characters
2. Hundred must be taken as the key value.
ASCII value of the character should be added
with the respective key value, and it must be
saved in any variable, for example, it can be
taken as s1
3. For the value s1 in second step, compute the
binary value
4. As the binary values must be a 8 digit number,
additional zeroes are added on its left
5. The binary should be reversed for the value in
the 4th
step
6. The reversed binary numbers should be divided
equally into two parts as part1 and Part 2
7. We should calculate 2’s complement for both
the parts and save it in the complement Part-1
and complement Part-2, accordingly.
1’s complement_ formula=D!=(2d
-1)-D
Where, D= Positive_Number
! represents Complement
2’s complement_formula =D! +i
Where, D! = 1’s complement
i=1 and it should be added at Least Significant
Bit of D!.
8. Complement Part-2 should be joined with
complement Part-1
9. Next 2’s complement should be calculated for
the joined complement parts.
Figure 1: Process of cryptography
Figure 2: Symmetric key cryptography
Figure 3: Asymmetric key cryptography
Suganya, et al.: Data communication using cryptography encryption
AJCSE/Apr-Jun-2022/Vol 7/Issue 2 55
Decimal_Number =D= B0 *
20
+ B1 *
21
+ B2 *
22
+….
Where, B=binary_digits
10. For the complement parts in 9th
step, the
hexadecimal code should be calculated.
Hexadecimal_Number=D/16
Where, D= Decimal_Number
11. If the hexadecimal code does not have 8 digits
add 0 to the left side of the hex code and
return it as encrypted data. Figure 4 shows the
architecture of Encryption methodology.
Example: -
Imaginethecharacter“G,”forinstance.Depending
on the given technique, the basic methods are
obtained.
1. Now take the character G and find the ASCII
code for the character which is 71
2. Hundred must be taken as the key value and
added to the value of ASCII, S1=71+100
which is 171
3. After that, we must estimate the binary value
for 171, which is 10101011
4. Binary value obtained from step 3 already
has 8 digits, so we’ll continue with Binary as
10101011
5. Binary value in 4th
step should be reversed
which is 11010101
6. Separate the value of previous steps into two
halves as Part 1-1101 and Part 2-0101
7. Next, find the 2’s Compliment for Part-
1 and Part-2 respectively and save
it in complementpart-1: 0011 and
complementpart-2: 1011
8. Then, we combine complement Part 2 with
complement Part 1, we get 10110011
9. Then,forthebinaryvalueacquiredintheeighth
step, find the 2’s complement. 01001101 is the
outcome
10. We must find the hexadecimal value for the
binary obtained in 9th
step which will be f468D
11. To make the hexadecimal value as 8 digits
add 0 to the left side and it is transformed into
000f468D.
Decryption methodology
1. We must transfer the encrypted files to its
binary representation
2. Add 0 to the leftmost corner of the binary
value to make it as eight digit number if it is
not in an appropriate format
3. Generate 2s’complement for the binary value
retrieved
4. Slice the binary value into two equivalent
parts as Part 1 and Part 2.
5. Then, for Parts 1 and 2, take 2’s complement
Figure 4: Architecture of encipher technique
Suganya, et al.: Data communication using cryptography encryption
AJCSE/Apr-Jun-2022/Vol 7/Issue 2 56
Figure 5: Architecture of decipher technique
Figure 6: Output of proposed methodology
and save it in the variables complement Part 1
and complement Part 2.
6. Now add the complement Part 2 with the
complement Part 1
7. Next the value from the previous step should
be reversed
8. Discover American Standard Code for
InformationInterchangeforaddedcomplement
part of 6th
step
9. Hundred is taken as the key value and hence
the key is subtracted from value of previous
step
10. Now look for one character in the ASCII code.
Figure 5 shows the architecture of decryption
methodology.
Example: -
Take “000f468D” as Encrypted Data. The steps
that precede are generated using specified
procedure.
1. Encrypted data should be changed to Binary,
which will be 1001101
2. Then we have to format the binary number
from 1st
step to 8 digits that is 01001101
3. After formatting the number, find the 2’s
complement for that binary number and the
value is 10110011
4. slice the binary from 4th
step equally as Part-
1: 1011 and Part-2: 0011
5. Next individually find the 2’s complement for
each part in the previous step and save it in
the variables, that is, complement Part-1: 0101
and complement Part-2: 1101.
6. Complement Part 2 is joined with complement
Part 1 and the result is 11010101.
7. The result is then reversed as 10101011.
8. The binary number obtained in 7th
step is
changed into ASCII code which is 171.
9. When we subtract the key which is 100 from
theASCII code in 8th
step we get 71 (171–100).
10. From step 9, we obtain the ASCII character
value as “G” that is the decrypted data.
RESULTS AND DISCUSSION
The proposed methodology is programmed in
Python 3.10.0 for experimental evaluation with PC
having the i5 preprocessor and 25 Megabit cache
memory with 2.42GHz Intel processor and also
having 8GB RAM. The preceding figures show the
encrypted and decrypted version of the alphabet
“G.” Figure 6 shows the output of the process.
CONCLUSION AND FUTUREWORK
To prevent personal information, encryption
technology translates actual text into unintelligible
textualinformation.Sometimes,wemustexchange
some confidential information. Ciphertext is
frequently used to protect actual data, also
Suganya, et al.: Data communication using cryptography encryption
AJCSE/Apr-Jun-2022/Vol 7/Issue 2 57
known as encrypted message, from cybersecurity
incidents by altering it to an unintelligible version
using a sequence of numbers. A new reliable
cryptographic technique is proposed in this paper
which is very simple in nature and has the quickest
runtime for encryption/decryption. Moreover, the
suggested methodology is simple to implement
in a real-world problem for the encrypting and
decrypting process.
REFERENCES
1. Sudharson D. Performance analysis of enhanced
adaboost framework in multifacet medical dataset.
NVEO 2021;8:1752-6.
2. Rizvi SW, Singh VK, Khan RA. Fuzzy logic based
software reliability quantification framework: Early
stage perspective (FLSRQF). Procedia Comput Sci
2016;89:359-68.
3. Sudharson D. A novel machine learning approach for
software reliability growth modelling with Pareto
distribution function. Soft Comput 2019;23:8379-87.
4. Garousi V, Mäntylä MV. A systematic literature
review of literature reviews in software testing. Inform
Software Technol 2016;80:195-216.
5. Jacobs IS, Bean CP. Fine particles, thin films and
exchange anisotropy. In: Rado G, Suhl H, editors.
Magnetism. Vol. 3. New York: Academic Press; 1963.
p. 271-350.
6. ArunKumar B. A novel approach for boundary line
detection using IOT during tennis matches. Adv Electr
Inform Commun Technol 2020;13:243-6.
7. Sudharson D, Fathima SA, Kailas PS, Vaishnavi KS,
DarshanaS,BhuvaneshwaranA.PerformanceEvaluation
of Improved Adaboost Framework in Randomized
Phases Through Stumps. New Jersey: IEEE Xplore;
2021.
8. Maxwell JC. A Treatise on Electricity and Magnetism.
3rd
ed., Vol. 2. Oxford: Clarendon; 1892. p. 68-73.
9. Sudharson D, Rani K. An overview of cloud scheduling
algorithms. Vidyabharati Int Interdiscipl Res J
2021:2:78-82.
10. Sudharson D. Improved EM algorithm in software
reliability growth models. Int J Powertrains 2020;9:
186-99.
11. Sudharson D. A novel AI and RF tutored student
locating system via unsupervised dataset. Turk J
Physiother Rehabil 2021;32:882-7.
12. Ayushi A. A symmetric key cryptographic algorithm.
Int J Comput Appl 2010;1:181-96.
13. Yuexia Q, Weijie G. The research on reliability
optimization of software system based on niche genetic
algorithm. AASRI Procedia 2012;1:404-9.
14. Sudharson D, Darshana S, Navin RS, Priyanka K,
Ashfia F, Abdulla FM. Self-Reliant Dimensionality
Reduction that uses Improved Pareto Distribution PCA
Framework. New Jersey: IEEE Xplore; 2021.
15. Mohanty R. Hybrid intelligent systems for predicting
software reliability. Appl Soft Comput 2013;13:
189-200.

More Related Content

Similar to Data Communication Using Cryptography Encryption

A novel method for digital data encoding-decoding
A novel method for digital data encoding-decodingA novel method for digital data encoding-decoding
A novel method for digital data encoding-decodingTELKOMNIKA JOURNAL
 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...IRJET Journal
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...IJECEIAES
 
A new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programmingA new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programmingcsandit
 
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMINGA NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMINGcscpconf
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique
Cryptosystem Based on Modified Vigenere Cipher using Encryption TechniqueCryptosystem Based on Modified Vigenere Cipher using Encryption Technique
Cryptosystem Based on Modified Vigenere Cipher using Encryption Techniqueijtsrd
 
A cloud security approach for data at rest
A cloud security approach for data at restA cloud security approach for data at rest
A cloud security approach for data at restijccsa
 
A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE neirew J
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)IJERA Editor
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 

Similar to Data Communication Using Cryptography Encryption (20)

A novel method for digital data encoding-decoding
A novel method for digital data encoding-decodingA novel method for digital data encoding-decoding
A novel method for digital data encoding-decoding
 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
 
A new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programmingA new cryptosystem with four levels of encryption and parallel programming
A new cryptosystem with four levels of encryption and parallel programming
 
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMINGA NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
A NEW CRYPTOSYSTEM WITH FOUR LEVELS OF ENCRYPTION AND PARALLEL PROGRAMMING
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique
Cryptosystem Based on Modified Vigenere Cipher using Encryption TechniqueCryptosystem Based on Modified Vigenere Cipher using Encryption Technique
Cryptosystem Based on Modified Vigenere Cipher using Encryption Technique
 
A cloud security approach for data at rest
A cloud security approach for data at restA cloud security approach for data at rest
A cloud security approach for data at rest
 
A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE A Cloud Security Approach for Data at Rest Using FPE
A Cloud Security Approach for Data at Rest Using FPE
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
Enhancement of Prefix Chiper in Format Preserving Encryption
Enhancement of Prefix Chiper in Format Preserving EncryptionEnhancement of Prefix Chiper in Format Preserving Encryption
Enhancement of Prefix Chiper in Format Preserving Encryption
 
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 

More from BRNSSPublicationHubI

Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...BRNSSPublicationHubI
 
Prediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification ApproachPrediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification ApproachBRNSSPublicationHubI
 
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...BRNSSPublicationHubI
 
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...BRNSSPublicationHubI
 
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...BRNSSPublicationHubI
 
Contactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a WebcamContactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a WebcamBRNSSPublicationHubI
 
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...BRNSSPublicationHubI
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 
FPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: SurveyFPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: SurveyBRNSSPublicationHubI
 
Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...BRNSSPublicationHubI
 
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...BRNSSPublicationHubI
 
An Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: SurveyAn Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: SurveyBRNSSPublicationHubI
 
Manifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical SystemsManifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical SystemsBRNSSPublicationHubI
 
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...BRNSSPublicationHubI
 
Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...BRNSSPublicationHubI
 
A Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector MachineA Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector MachineBRNSSPublicationHubI
 
A Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial VideoA Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial VideoBRNSSPublicationHubI
 
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...BRNSSPublicationHubI
 
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...BRNSSPublicationHubI
 
Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...BRNSSPublicationHubI
 

More from BRNSSPublicationHubI (20)

Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
Computational Dual-system Imaging Processing Methods for Lumbar Spine Specime...
 
Prediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification ApproachPrediction of Neurological Disorder using Classification Approach
Prediction of Neurological Disorder using Classification Approach
 
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
On increasing of the Density of Elements of Field-effect Heterotransistors Fr...
 
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
On Optimization of Manufacturing of Field-effect Transistors to Increase Thei...
 
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
The Optimization-based Approaches for Task Scheduling to Enhance the Resource...
 
Contactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a WebcamContactless Real-Time Vital Signs Monitoring Using a Webcam
Contactless Real-Time Vital Signs Monitoring Using a Webcam
 
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
Secure and Energy Savings Communication of Flying Ad Hoc Network for Rescue O...
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
FPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: SurveyFPGA Hardware Design of Different LDPC Applications: Survey
FPGA Hardware Design of Different LDPC Applications: Survey
 
Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...Design and Implementation of Smart Air Pollution Monitoring System Based on I...
Design and Implementation of Smart Air Pollution Monitoring System Based on I...
 
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
Smart Monitoring System for Substation’ Parameters and Automatic under Freque...
 
An Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: SurveyAn Automatic Coronavirus Detection Systems: Survey
An Automatic Coronavirus Detection Systems: Survey
 
Manifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical SystemsManifolds and Catastrophes for Physical Systems
Manifolds and Catastrophes for Physical Systems
 
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
Explore the Influencing Variables of Personality Traits on Motives of Adaptin...
 
Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...Use of Digital Health Technologies in HealthCare Organization: A System Persp...
Use of Digital Health Technologies in HealthCare Organization: A System Persp...
 
A Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector MachineA Predictive Model for Novel Corona Virus Detection with Support Vector Machine
A Predictive Model for Novel Corona Virus Detection with Support Vector Machine
 
A Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial VideoA Survey on Non-Contact Heart Rate Estimation from Facial Video
A Survey on Non-Contact Heart Rate Estimation from Facial Video
 
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
Impact of Classification Algorithms on Cardiotocography Dataset for Fetal Sta...
 
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
Improved Particle Swarm Optimization Based on Blockchain Mechanism for Flexib...
 
Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...Investigating the Relationship Between Teaching Performance and Research Perf...
Investigating the Relationship Between Teaching Performance and Research Perf...
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Data Communication Using Cryptography Encryption

  • 1. © 2022, AJCSE. All Rights Reserved 53 RESEARCH ARTICLE Data Communication Using Cryptography Encryption K. Suganya, S. Nethra, S. S. Dhanyaa, D. Sudharson Department of Artificial Intelligence and Data Science, Kumaraguru College of Technology, Coimbatore, Tamil Nadu, India Received on: 12/02/2022; Revised on: 30/03/2022; Accepted on: 15/04/2022 ABSTRACT The massive rise of this technology will be critical in the future years. All types of data that exist in the cloud are private to each and every one which can be easily pirated by an attacker when it is sent to the receiver. The desire for honesty, intimacy, solidity, seclusion, and the necessary methods for manipulation are heightened. The below-mentioned article briefly introduces cryptographic methods and a new method of cryptographic algorithms to secure data which improve the security of information that prevents the application in computing of cloud from piracy. Key words: Cloud computing, Decipher, Encipher INTRODUCTION One of the most crucial aspects of today’s society is data protection. Cryptography is nothing but writing the text secretly. It is a technique which assures the secrecy of the users’data.[1,2] Cryptography protects a customer’s or company’s data by switching it to a form that is legible but incomprehensible to unauthorized persons and then turning it again to a format that is readable only with qualified individuals. Figure 1 represents the process of cryptography. An encipher technique that translates the plaintext into another format, called an encipher key ciphertext, and changes the ciphertext into plaintext with the help of identical encipher key or a distinct encipher key depending on methodologies which is being helpful in encryption of data. TYPES OF CRYPTOGRAPHY Crypto uses a method of encryption (nothing but turning original data to encrypted data) and decryption (transforming back to original data). There are different types of encipher and decipher, yet the vastly practiced methodologies are listed. SYMMETRICKEY ENCRYPTION Using symmetric key cryptographic technique, encryption and decryption of original text can Address for correspondence: D. Sudharson E-mail: sudharsondorai.ads@kct.ac.in be done using a unique key. Both the clients should know the keys; therefore, they can read or write the data. Figure 2 explains the working of symmetric key Cryptography. Data Encryption Standard, Advanced Encryption Standard, Triple Data Encryption Standard, and other symmetric key algorithms are among them.[3,4] ASYMMETRIC KEY CRYPTOGRAPHY Using this approach of cryptographic technique, decryption and encryption of original text can be done using exceptional keys. Public key is a key which is being used to encipher the information and private key is a key which is being used to decipher the information.[5] These keys are distinct from one another. Recipient has the availability only to the private key. Figure 3 explains the working of Asymmetric key Cryptography. LITERATURE REVIEW 1. “Effective Encipher Schemes in Crypto ImprovedSecurity”isofferedbyReemaGupta. The study encourages encryption while also examining its limitations and methods.[6] Also addressed various transpositional strategies such as simple columnar and row Route Cipher transposition and so on.[7] 2. “A Revolutionary Rsa Algorithm of CryptographicAlgorithm with High Efficiency for Data Security” is offered by Suyash Verma Available Online at www.ajcse.info Asian Journal of Computer Science Engineering 2022;7(2):53-57 ISSN 2581 – 3781
  • 2. Suganya, et al.: Data communication using cryptography encryption AJCSE/Apr-Jun-2022/Vol 7/Issue 2 54 and colleagues. The cryptography technique proposed by him is quicker than the existing one. They arrived at their conclusion by analyzing various simple texts in about the same key (DPSK) method.[8,9] 3. “A Reliable Crypto method for Protecting text messages against Cryptanalytic Attacks and Brute Force.”[10] The report explains how Brute force attacks can be protected using the schemes of cryptography. 4. “CryptographyandNetworkSecurity,”evaluated by Daniel L Calloway, equates and distinguishes studies based on past articles in trend patterns. 5. “A Symmetric Key Cryptographic Algorithm” was postulated by Ayushi. Ayushi launched two kindsofdataencryptionalgorithms,asymmetric and symmetric key.[11] In addition, a dynamic cryptographic technique was developed by her. To convert clear text to encrypted message, she employed keys equal to or larger than 1000, as well as binary and algebraic operations. PROBLEM STATEMENT Nowadays, data transmission is not trustworthy. Transmission of data from one server to another server can be sometimes easily cracked or modified.[12] External organizations meddling with transmitting data leads in loss of data or excess of data. Hence, we have tried to find a way to send data in a more secure way.[13] PROPOSED FRAMEWORK Symmetric approach Symmetrickeyencodingrequiresminimalruntime, and it is always simple to execute in application scenarios; however, their disadvantage is key’s security must be moved in both the clients. This method emphasizes progressing the conventional encryption technology by employing the substitution technique. The first separate character in this suggested technique is transformed into its corresponding ASCII code valuation, as well as further cryptography is accomplished.[14,15] Encryption methodology 1. ASCII value must be assigned to all the unique characters 2. Hundred must be taken as the key value. ASCII value of the character should be added with the respective key value, and it must be saved in any variable, for example, it can be taken as s1 3. For the value s1 in second step, compute the binary value 4. As the binary values must be a 8 digit number, additional zeroes are added on its left 5. The binary should be reversed for the value in the 4th step 6. The reversed binary numbers should be divided equally into two parts as part1 and Part 2 7. We should calculate 2’s complement for both the parts and save it in the complement Part-1 and complement Part-2, accordingly. 1’s complement_ formula=D!=(2d -1)-D Where, D= Positive_Number ! represents Complement 2’s complement_formula =D! +i Where, D! = 1’s complement i=1 and it should be added at Least Significant Bit of D!. 8. Complement Part-2 should be joined with complement Part-1 9. Next 2’s complement should be calculated for the joined complement parts. Figure 1: Process of cryptography Figure 2: Symmetric key cryptography Figure 3: Asymmetric key cryptography
  • 3. Suganya, et al.: Data communication using cryptography encryption AJCSE/Apr-Jun-2022/Vol 7/Issue 2 55 Decimal_Number =D= B0 * 20 + B1 * 21 + B2 * 22 +…. Where, B=binary_digits 10. For the complement parts in 9th step, the hexadecimal code should be calculated. Hexadecimal_Number=D/16 Where, D= Decimal_Number 11. If the hexadecimal code does not have 8 digits add 0 to the left side of the hex code and return it as encrypted data. Figure 4 shows the architecture of Encryption methodology. Example: - Imaginethecharacter“G,”forinstance.Depending on the given technique, the basic methods are obtained. 1. Now take the character G and find the ASCII code for the character which is 71 2. Hundred must be taken as the key value and added to the value of ASCII, S1=71+100 which is 171 3. After that, we must estimate the binary value for 171, which is 10101011 4. Binary value obtained from step 3 already has 8 digits, so we’ll continue with Binary as 10101011 5. Binary value in 4th step should be reversed which is 11010101 6. Separate the value of previous steps into two halves as Part 1-1101 and Part 2-0101 7. Next, find the 2’s Compliment for Part- 1 and Part-2 respectively and save it in complementpart-1: 0011 and complementpart-2: 1011 8. Then, we combine complement Part 2 with complement Part 1, we get 10110011 9. Then,forthebinaryvalueacquiredintheeighth step, find the 2’s complement. 01001101 is the outcome 10. We must find the hexadecimal value for the binary obtained in 9th step which will be f468D 11. To make the hexadecimal value as 8 digits add 0 to the left side and it is transformed into 000f468D. Decryption methodology 1. We must transfer the encrypted files to its binary representation 2. Add 0 to the leftmost corner of the binary value to make it as eight digit number if it is not in an appropriate format 3. Generate 2s’complement for the binary value retrieved 4. Slice the binary value into two equivalent parts as Part 1 and Part 2. 5. Then, for Parts 1 and 2, take 2’s complement Figure 4: Architecture of encipher technique
  • 4. Suganya, et al.: Data communication using cryptography encryption AJCSE/Apr-Jun-2022/Vol 7/Issue 2 56 Figure 5: Architecture of decipher technique Figure 6: Output of proposed methodology and save it in the variables complement Part 1 and complement Part 2. 6. Now add the complement Part 2 with the complement Part 1 7. Next the value from the previous step should be reversed 8. Discover American Standard Code for InformationInterchangeforaddedcomplement part of 6th step 9. Hundred is taken as the key value and hence the key is subtracted from value of previous step 10. Now look for one character in the ASCII code. Figure 5 shows the architecture of decryption methodology. Example: - Take “000f468D” as Encrypted Data. The steps that precede are generated using specified procedure. 1. Encrypted data should be changed to Binary, which will be 1001101 2. Then we have to format the binary number from 1st step to 8 digits that is 01001101 3. After formatting the number, find the 2’s complement for that binary number and the value is 10110011 4. slice the binary from 4th step equally as Part- 1: 1011 and Part-2: 0011 5. Next individually find the 2’s complement for each part in the previous step and save it in the variables, that is, complement Part-1: 0101 and complement Part-2: 1101. 6. Complement Part 2 is joined with complement Part 1 and the result is 11010101. 7. The result is then reversed as 10101011. 8. The binary number obtained in 7th step is changed into ASCII code which is 171. 9. When we subtract the key which is 100 from theASCII code in 8th step we get 71 (171–100). 10. From step 9, we obtain the ASCII character value as “G” that is the decrypted data. RESULTS AND DISCUSSION The proposed methodology is programmed in Python 3.10.0 for experimental evaluation with PC having the i5 preprocessor and 25 Megabit cache memory with 2.42GHz Intel processor and also having 8GB RAM. The preceding figures show the encrypted and decrypted version of the alphabet “G.” Figure 6 shows the output of the process. CONCLUSION AND FUTUREWORK To prevent personal information, encryption technology translates actual text into unintelligible textualinformation.Sometimes,wemustexchange some confidential information. Ciphertext is frequently used to protect actual data, also
  • 5. Suganya, et al.: Data communication using cryptography encryption AJCSE/Apr-Jun-2022/Vol 7/Issue 2 57 known as encrypted message, from cybersecurity incidents by altering it to an unintelligible version using a sequence of numbers. A new reliable cryptographic technique is proposed in this paper which is very simple in nature and has the quickest runtime for encryption/decryption. Moreover, the suggested methodology is simple to implement in a real-world problem for the encrypting and decrypting process. REFERENCES 1. Sudharson D. Performance analysis of enhanced adaboost framework in multifacet medical dataset. NVEO 2021;8:1752-6. 2. Rizvi SW, Singh VK, Khan RA. Fuzzy logic based software reliability quantification framework: Early stage perspective (FLSRQF). Procedia Comput Sci 2016;89:359-68. 3. Sudharson D. A novel machine learning approach for software reliability growth modelling with Pareto distribution function. Soft Comput 2019;23:8379-87. 4. Garousi V, Mäntylä MV. A systematic literature review of literature reviews in software testing. Inform Software Technol 2016;80:195-216. 5. Jacobs IS, Bean CP. Fine particles, thin films and exchange anisotropy. In: Rado G, Suhl H, editors. Magnetism. Vol. 3. New York: Academic Press; 1963. p. 271-350. 6. ArunKumar B. A novel approach for boundary line detection using IOT during tennis matches. Adv Electr Inform Commun Technol 2020;13:243-6. 7. Sudharson D, Fathima SA, Kailas PS, Vaishnavi KS, DarshanaS,BhuvaneshwaranA.PerformanceEvaluation of Improved Adaboost Framework in Randomized Phases Through Stumps. New Jersey: IEEE Xplore; 2021. 8. Maxwell JC. A Treatise on Electricity and Magnetism. 3rd ed., Vol. 2. Oxford: Clarendon; 1892. p. 68-73. 9. Sudharson D, Rani K. An overview of cloud scheduling algorithms. Vidyabharati Int Interdiscipl Res J 2021:2:78-82. 10. Sudharson D. Improved EM algorithm in software reliability growth models. Int J Powertrains 2020;9: 186-99. 11. Sudharson D. A novel AI and RF tutored student locating system via unsupervised dataset. Turk J Physiother Rehabil 2021;32:882-7. 12. Ayushi A. A symmetric key cryptographic algorithm. Int J Comput Appl 2010;1:181-96. 13. Yuexia Q, Weijie G. The research on reliability optimization of software system based on niche genetic algorithm. AASRI Procedia 2012;1:404-9. 14. Sudharson D, Darshana S, Navin RS, Priyanka K, Ashfia F, Abdulla FM. Self-Reliant Dimensionality Reduction that uses Improved Pareto Distribution PCA Framework. New Jersey: IEEE Xplore; 2021. 15. Mohanty R. Hybrid intelligent systems for predicting software reliability. Appl Soft Comput 2013;13: 189-200.