International Journal of Scientific and Research Publications

Home
About Us
Editorial Board

Online Publication

Log In
New User?
       Register Now!
Forgot Password?
       Email Password!


Call For Papers

Call for Research Paper

Authors

Online Submission
Paper Submission Guidelines
Online Publication Charge
Print Publication Charge
How to publish research paper
Publication Certificate
Research Catalogue
Resources
FAQs

Reviewer

Join Reviewer Panel
Reviewer Guidelines

Downloads

IJSRP Paper Format
Instructions

Contact Us

Feedback Form
Contact Us
Site Map

IJSRP, Volume 7, Issue 2, February 2017 Edition [ISSN 2250-3153]



      Tomba I.

Abstract: The efficiency of a cryptographic algorithm is based on the time taken for encryption/decryption and the way it produces different cipher-text from a clear-text [1]. An alternative approach was suggested for handling ASCII characters in the cryptosystem, a magic square implementation to enhance the efficiency by providing add-on security to the cryptosystem. The encryption/decryption is based on numerals generated by magic square rather than ASCII values and expected to provide another layer of security to any public key algorithms such as RSA, EL Gamal etc.

[Reference this Paper]   [BACK]

Ooops! It appears you don't have a PDF plugin for this barrPostingser. you can click here to download the PDF file.

Reference this Research Paper (copy & paste below code):

Tomba I. - Add-on security using Weak Magic squares in Public Key Cryptosystem, Modified with Dummy Letters - published at: "International Journal of Scientific and Research Publications (IJSRP), Volume 7, Issue 2, February 2017 Edition".

IJSRP PUBLICATIONS

Home

About Us
Editorial Board
Call for Paper

Call for Research Paper
Paper Status
IJSRP Paper Format
Join Us

Download e-journal
Join Forum
Invite Friends
Subscribe
Get Social with Us!



Copyright © 2011-2016, IJSRP Inc., All rights reserved.