© 2018 JETIR December 2018, Volume 5, Issue 12 www.jetir.org (ISSN-2349-5162) JETIRDZ06011 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 105 A Novel Cryptographic Method for Information security with Low Computational Cost Nahida Nazir, Pushpendra Kumar Pateriya School of Computer Science & Engineering Lovely Professional University, Punjab, India Abstract: Encryption and decryption techniques are gaining importance in the cryptographic system.In this context a new encrypting and decrypting technique have been designed to secure the plain text over the internet and preventing all the prone attacks like man in middle attack and other vulnerable threats. It is actually encrypting and decrypting the text with the special characters and symbols along with the variations in mapping that makes it impossible for the intruder to breach the ethics of security like confidentiality,availability, integrity, Denial of Service. This paper also highlights the strengths and drawbacks of the designed system. 1. INTRODUCTION Cryptography is a technique of coding the data so that it cannot be interpreted by all the humans and the subject that deals with the breaking of the coding information and creating its meaning text or data is called cryptanalysis[1] .In cryptography the human readable text is known as plain text and the text that is in coded form is called cipher text[2].There are number of techniques that can be implemented to create cipher text like substitution techniques and transposition techniques[7]. In substitution technique the plain text is coded either with numbers, letters or with some special characters .In transposition technique the letters are rearranged[3] .In former technique the position remains unchanged only the letters change .But in transposition technique the position of letters is also changed. The substitution technique is further categorized in mono alphabetic and polyalphabetic cipher techniques .Key and keyless ciphers belong to the Transpositiontechnique. Symmetric key encryption it is based on single key arrangement Block cipher and stream ciphers are the two types of symmetric approach .Symmetric algorithm is fast but the major drawback of this technique is how the keys can be shared between the sender and the receiver for encryption and decryption process. In asymmetric encryption also known as public private encryption that involves two separate keys for coding and decoding process[5].Private key is kept confidential and the public key is exchanged[8]. This research work is intended to investigate how secure the data is when it is travelled from one person to another. We know that the highly confidential data is transferred over network in an encrypted form. There are many types of encryption algorithms which are being used. Most of the modern encryption-decryption algorithms are complicated and require more computational power, so there is a scope of designing new cryptographic algorithms which will be robust in nature and perform the encryption/decryption in optimal period of time.The Cryptographic Algorithm is used to keep the message confidential and at the same time it allows us the facility of sending it from one person to another person through any medium either be it online or offline. This cryptography Cipher makes sure that your data is secure in the process of transmission. This Crypt Cipher is very easy to use as this Crypto Graphical Cipher is shared only between the sender and receiver. This Crypt Cipher uniqueness comes with its features like replaceable, replicable, complicated decryption, cannot be broke by using brute force algorithms as it is generated according to the user. 2. Literature Review Secure data communication over network is essential and Challenging incurrent situations to ensure datasecurity over networks. Number of cryptographic algorithms or cipher techniques are present and the techniques chosen for coding and decoding should meet the basic fundamentals of network security research by Jitendra Singh Chauhan and S. K. Sharma in 2015 provided the comparison of various existing algorithms like Advanced Encryption Standard algorithm, Data Encryption Standard