Loading

Kamal Transformation based Cryptographic Technique in Network Security Involving ASCII Value
Ayush Mittal1, Ravindra Gupta2

1Mr.Ayush Mittal*, Pursuing PhD, Computer Science and Engineering, SRK University, Bhopal, MP, India.
2Dr. Ravindra Kumar Gupta, Associate Professor, Computer Science and Engineering, Department in RKDFIST, Bhopal, M.P, India.

Manuscript received on September 16, 2019. | Revised Manuscript received on 24 September, 2019. | Manuscript published on October 10, 2019. | PP: 3448-3450 | Volume-8 Issue-12, October 2019. | Retrieval Number: L25921081219/2019©BEIESP | DOI: 10.35940/ijitee.L2592.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: From old times, information security has been an essential part of human life. Day to day developing new technologies and increasing number of users share information with each other, securing information is becoming more important. For securing information, there are several techniques out of which most common is cryptography. Cryptography is a technique involving securing transmission of messages in presence of adversaries. The basic aim is to hide the information from unauthorized users. Cryptography includes to phases: encryption of plain message and decrypting encrypted message. The aim of this paper is to use new integral transform “Kamal transform” and congruence modulo operator involving ASCII value for encryption and decryption of message.
Keywords: Encryption, Decryption, ASCII, Plaintext, Ciphertext, Kamal Transform, Network Security, Cryptography.
Scope of the Article: Aggregation, Integration, and Transformation