Abstract
Generally, in encryption or decryption process some of the characters are inter changed by using some encryption and decryption algorithms with key.This paper puts focusing a safe mechanism for secured message passing to tackle the security problem of information. We propose a new technique to encrypt the text message by sorting technique. In our method, the encryption process which is carried out by the plain text is arranged in to alphabetical order by sorting procedure and produces the cipher text. The proposed encryption technique needs the ASCII value of the characters. This technique has two advantages over traditional schemes. First, the encryption and decryption procedures are very simple, and subsequently, much faster. Second, the security level is very high due to the ASCII value substitutions of alphabetic characters. In this paper, the encryption and decryption procedures are explained.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Wikipedia, “Encryption”, http://en.wikipedia.org/wiki/Encryption (modified on December 13, 2006)
Lee, M.H.: Bounds on Substitution Ciphers. IEEE Information Theory 6, 2294–2296 (2007)
Stinson, D.R.: Cryptogrphy Theory and Practice, 2nd edn.
Kaufman, C., et al.: Network Security Private Communication in a Public World. Prentice Hall of India Private Limited (2003)
Information Technology Journal 4(3), 204–221 (2005)
Information Technology Journal 4(3), 204–221 (2005)
Shannon’s, C.: Communication Theory of Secrecy Systems
Yang, K.-H., Niu, S.-J.: Data Safe Transmission Mechanism Based on Integrated Encryption Algorithm. Staffordshire University
Chen Tao, X.Y.: Design and implementation of encryption algorithm based on dimension magic cube. Journal of Information 2, 13–14 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Muthusundari, S., Santhosh Baboo, S. (2012). A New Encryption Method for Secured Message Passing by Sorting Technique. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Computer Science and Information Technology. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 86. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27317-9_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-27317-9_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27316-2
Online ISBN: 978-3-642-27317-9
eBook Packages: Computer ScienceComputer Science (R0)