© 2018 JETIR December 2018, Volume 5, Issue 12 www.jetir.org (ISSN-2349-5162)
JETIRDZ06011 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 105
A Novel Cryptographic Method for Information
security with Low Computational Cost
Nahida Nazir, Pushpendra Kumar Pateriya
School of Computer Science & Engineering
Lovely Professional University, Punjab, India
Abstract: Encryption and decryption techniques are gaining importance in the cryptographic system.In this
context a new encrypting and decrypting technique have been designed to secure the plain text over the
internet and preventing all the prone attacks like man in middle attack and other vulnerable threats. It is
actually encrypting and decrypting the text with the special characters and symbols along with the variations in
mapping that makes it impossible for the intruder to breach the ethics of security like confidentiality,availability,
integrity, Denial of Service. This paper also highlights the strengths and drawbacks of the designed system.
1. INTRODUCTION
Cryptography is a technique of coding the data so that it cannot be interpreted by all the humans and
the subject that deals with the breaking of the coding information and creating its meaning text or data
is called cryptanalysis[1] .In cryptography the human readable text is known as plain text and the text
that is in coded form is called cipher text[2].There are number of techniques that can be implemented
to create cipher text like substitution techniques and transposition techniques[7]. In substitution
technique the plain text is coded either with numbers, letters or with some special characters .In
transposition technique the letters are rearranged[3] .In former technique the position remains
unchanged only the letters change .But in transposition technique the position of letters is also
changed. The substitution technique is further categorized in mono alphabetic and polyalphabetic
cipher techniques .Key and keyless ciphers belong to the
Transpositiontechnique. Symmetric key encryption it is based on single key arrangement
Block cipher and stream ciphers are the two types of symmetric approach .Symmetric algorithm is fast
but the major drawback of this technique is how the keys can be shared between the sender and the
receiver for encryption and decryption process. In asymmetric encryption also known as public private
encryption that involves two separate keys for coding and decoding process[5].Private key is kept
confidential and the public key is exchanged[8].
This research work is intended to investigate how secure the data is when it is travelled from one
person to another. We know that the highly confidential data is transferred over network in an
encrypted form. There are many types of encryption algorithms which are being used. Most of the
modern encryption-decryption algorithms are complicated and require more computational power, so
there is a scope of designing new cryptographic algorithms which will be robust in nature and perform
the encryption/decryption in optimal period of time.The Cryptographic Algorithm is used to keep the
message confidential and at the same time it allows us the facility of sending it from one person to
another person through any medium either be it online or offline. This cryptography Cipher makes sure
that your data is secure in the process of transmission. This Crypt Cipher is very easy to use as this
Crypto Graphical Cipher is shared only between the sender and receiver. This Crypt Cipher
uniqueness comes with its features like replaceable, replicable, complicated decryption, cannot be
broke by using brute force algorithms as it is generated according to the user.
2. Literature Review
Secure data communication over network is essential and Challenging incurrent situations to ensure
datasecurity over networks. Number of cryptographic algorithms or cipher techniques are present and
the techniques chosen for coding and decoding should meet the basic fundamentals of network
security research by Jitendra Singh Chauhan and S. K. Sharma in 2015 provided the comparison of
various existing algorithms like Advanced Encryption Standard algorithm, Data Encryption Standard