Implementation of Cipher text Generation Algorithm using ASCII Values

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Algorithm of Cipher Text Containing Key to Produce Cipher Text Transmitted in Network Securit y

A plaintext is separated into two parts, a fixed length part and a variable length part. The second part of the plaintext is encrypted to a cipher text using a key. In this paper, an encryption algorithm which encrypts the first part of the plaintext and the key of the second part to a cipher text is proposed. Basic computing operations, such as inserting dummy symbols, rotating, transposition,...

متن کامل

DEM Registration and Error Analysis using ASCII values

Digital Elevation Model (DEM), while providing a “bare earth” look, is heavily used in many applications including construction modeling, visualization, and GIS. Their registration techniques have not been explored much. Methods like Coarse-to-fine or pyramid making are common in DEM-to-image or DEM-to-map registration. Selfconsistency measure is used to detect any change in terrain elevation a...

متن کامل

Text Summarization Using Cuckoo Search Optimization Algorithm

Today, with rapid growth of the World Wide Web and creation of Internet sites and online text resources, text summarization issue is highly attended by various researchers. Extractive-based text summarization is an important summarization method which is included of selecting the top representative sentences from the input document. When, we are facing into large data volume documents, the extr...

متن کامل

Cipher text only attack on speech time scrambling systems using correction of audio spectrogram

Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...

متن کامل

Design of Stream Cipher for Text Encryption using Particle Swarm Optimization based Key Generation

Encryption of data traffic in a network is essential since it is vulnerable to eavesdropping. Thus the data transferred in a network is encrypted. Encryption can be done using stream cipher method such as Vernam Cipher which is considered to be the perfect cipher. However this method suffers from the drawback of storing and distributing a large number of keys. In this paper we propose a Particl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology

سال: 2018

ISSN: 2321-9653

DOI: 10.22214/ijraset.2018.6155