A Cryptographic Technique Involving Substitution Algorithm and Logical Operator


Authors : Lalit Chaurasiya; S.S. Shrivastava

Volume/Issue : Volume 10 - 2025, Issue 3 - March


Google Scholar : https://tinyurl.com/dcfxawz2

Scribd : https://tinyurl.com/3yp2zx3u

DOI : https://doi.org/10.38124/ijisrt/25mar1205

Google Scholar

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 15 to 20 days to display the article.


Abstract : The purpose of this paper is to implement an encryption and decryption algorithm for symmetric key cryptography that combines substitution method and a newly developed cryptographic technique utilizing the Xor cipher. An Xor cipher is exceptionally useful for encryption and decryption processes because it transforms bits in relation to another string of binary data (the key) that bears no relation to the primary data. This fact leads to considerable ambiguity on the part of attackers trying to guess the value of the key or the plain text, making the system more robust against security attacks.

Keywords : Substitution algorithm, Xor cipher, Encryption and Decryption.

References :

  1. Forouzan Behrouz A: Cryptography & Network Security, McGraw Hill Education, 2007.
  2. Garg Satish Kumar: Cryptography Using XOR Cipher, Research Journal of Science and Technology, Vol. 09, Issue 01, 2017.
  3. Kahate Atul: Cryptography and Network Security, Tata McGraw Hill, New Delhi, 2008.
  4. Mittal Ayush and Gupta Ravindra Kumar: Encryption and Decryption of a Message Involving Genetic Algorithm, International Journal of Engineering and Advanced Technology (IJEAT), Volume-9 Issue-2, December, 2019.
  5. Sindhuja K, Pramela Devi S: A Symmetric Key Encryption Technique Using Genetic Algorithm, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5, Issue 1, 2014.
  6. Stallings William: Cryptography and Network Security Principles and Practices, Prentice Hall, 2005.

The purpose of this paper is to implement an encryption and decryption algorithm for symmetric key cryptography that combines substitution method and a newly developed cryptographic technique utilizing the Xor cipher. An Xor cipher is exceptionally useful for encryption and decryption processes because it transforms bits in relation to another string of binary data (the key) that bears no relation to the primary data. This fact leads to considerable ambiguity on the part of attackers trying to guess the value of the key or the plain text, making the system more robust against security attacks.

Keywords : Substitution algorithm, Xor cipher, Encryption and Decryption.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe