Encryption Algorithm using 2-Dimension Key for Information Security
Sarika Y. Bonde1, U. S. Bhadade2
1Sarika Y. Bonde, Research Scholar, K.B.C. North Maharashtra University, Jalgaon, (M.S) India.
2Prof. Dr. U. S. Bhadade, Professor and Head, Department of Information Technology, S. S. B. T. College of Engineering & Technology, Bambhori, Jalgaon, (M.S) India.
Manuscript received on July 13, 2019. | Revised Manuscript received on August 22, 2019. | Manuscript published on August 30, 2019. | PP: 4874-4877 | Volume-8 Issue-6, August 2019. | Retrieval Number: F9129088619/2019©BEIESP | DOI: 10.35940/ijeat.F9129.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Latest development in wireless technology has found many users and wide applications. As the applicants and users are more, Security of data is a main concern. Wireless networks are very common for both organizations and individuals. The transmission of confidential data like e-mails, banking transactions, credit card details etc. on common transmission media is unsecured. To protect the data during transmission is essential for successful operation of system, which mostly rely on this data. In this paper, proposed an enhanced method for data encryption and decryption which guarantees data confidentiality during its transmission over network. User’s data is encrypted before transmission by assigning less number of bits to the plain ASCII text. The key used will consist of all plain ASCII text in random fashion and will be treated as 2-dimension array. In this way, data is transmitting in a secure and efficient manner accomplishing the main goal of Cryptography. 2-dimension array result is compared with Advanced Encryption Standard (AES) algorithm. The use of 2-dimension array will provide security and saves effort of the data to be encrypted.
Keywords: Cryptography, Encryption, Decryption, ASCII, AES.