Authors :
Lalit Chaurasiya; S.S. Shrivastava
Volume/Issue :
Volume 10 - 2025, Issue 3 - March
Google Scholar :
https://tinyurl.com/dcfxawz2
Scribd :
https://tinyurl.com/3yp2zx3u
DOI :
https://doi.org/10.38124/ijisrt/25mar1205
Google Scholar
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 15 to 20 days to display the article.
Abstract :
The purpose of this paper is to implement an encryption and decryption algorithm for symmetric key
cryptography that combines substitution method and a newly developed cryptographic technique utilizing the Xor cipher.
An Xor cipher is exceptionally useful for encryption and decryption processes because it transforms bits in relation to
another string of binary data (the key) that bears no relation to the primary data. This fact leads to considerable ambiguity
on the part of attackers trying to guess the value of the key or the plain text, making the system more robust against security
attacks.
Keywords :
Substitution algorithm, Xor cipher, Encryption and Decryption.
References :
- Forouzan Behrouz A: Cryptography & Network Security, McGraw Hill Education, 2007.
- Garg Satish Kumar: Cryptography Using XOR Cipher, Research Journal of Science and Technology, Vol. 09, Issue 01, 2017.
- Kahate Atul: Cryptography and Network Security, Tata McGraw Hill, New Delhi, 2008.
- Mittal Ayush and Gupta Ravindra Kumar: Encryption and Decryption of a Message Involving Genetic Algorithm, International Journal of Engineering and Advanced Technology (IJEAT), Volume-9 Issue-2, December, 2019.
- Sindhuja K, Pramela Devi S: A Symmetric Key Encryption Technique Using Genetic Algorithm, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5, Issue 1, 2014.
- Stallings William: Cryptography and Network Security Principles and Practices, Prentice Hall, 2005.
The purpose of this paper is to implement an encryption and decryption algorithm for symmetric key
cryptography that combines substitution method and a newly developed cryptographic technique utilizing the Xor cipher.
An Xor cipher is exceptionally useful for encryption and decryption processes because it transforms bits in relation to
another string of binary data (the key) that bears no relation to the primary data. This fact leads to considerable ambiguity
on the part of attackers trying to guess the value of the key or the plain text, making the system more robust against security
attacks.
Keywords :
Substitution algorithm, Xor cipher, Encryption and Decryption.