Skip to main content

Abstract

Generally, in encryption or decryption process some of the characters are inter changed by using some encryption and decryption algorithms with key.This paper puts focusing a safe mechanism for secured message passing to tackle the security problem of information. We propose a new technique to encrypt the text message by sorting technique. In our method, the encryption process which is carried out by the plain text is arranged in to alphabetical order by sorting procedure and produces the cipher text. The proposed encryption technique needs the ASCII value of the characters. This technique has two advantages over traditional schemes. First, the encryption and decryption procedures are very simple, and subsequently, much faster. Second, the security level is very high due to the ASCII value substitutions of alphabetic characters. In this paper, the encryption and decryption procedures are explained.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wikipedia, “Encryption”, http://en.wikipedia.org/wiki/Encryption (modified on December 13, 2006)

  2. Lee, M.H.: Bounds on Substitution Ciphers. IEEE Information Theory 6, 2294–2296 (2007)

    MATH  Google Scholar 

  3. Stinson, D.R.: Cryptogrphy Theory and Practice, 2nd edn.

    Google Scholar 

  4. Kaufman, C., et al.: Network Security Private Communication in a Public World. Prentice Hall of India Private Limited (2003)

    Google Scholar 

  5. Information Technology Journal 4(3), 204–221 (2005)

    Google Scholar 

  6. Information Technology Journal 4(3), 204–221 (2005)

    Google Scholar 

  7. Shannon’s, C.: Communication Theory of Secrecy Systems

    Google Scholar 

  8. Yang, K.-H., Niu, S.-J.: Data Safe Transmission Mechanism Based on Integrated Encryption Algorithm. Staffordshire University

    Google Scholar 

  9. Chen Tao, X.Y.: Design and implementation of encryption algorithm based on dimension magic cube. Journal of Information 2, 13–14 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Muthusundari, S., Santhosh Baboo, S. (2012). A New Encryption Method for Secured Message Passing by Sorting Technique. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Computer Science and Information Technology. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 86. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27317-9_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27317-9_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27316-2

  • Online ISBN: 978-3-642-27317-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics