ISSN: 2229-371X
Monodeep Banerjee1, Saptarshi Naskar*2, Krishnendu Basuli3, Samar Sen Sarma4
|
Corresponding Author: Saptarshi Naskar, E-mail: sapgrin@gmail.com |
Related article at Pubmed, Scholar Google |
Visit for more related articles at Journal of Global Research in Computer Sciences
Cryptography is used to make users convinced that their messages had not been tainted during transmission. However, it relied on mutual trust between the communicating parties. The application of cryptography is such as Key Agreement, Data Encryption, Data Decryption and Digital Signature. Our approach is quite different we have encrypted the text data by the efficient compression method. Were it is quite difficult to decrypt unless until we know the particular compression technique
INTRODUCTION |
The cryptography is compulsory because when a shared secret can be recognized between two communicating parties online by exchanging only public keys and public constants if any [1]. Any third party, who has access only to the exchanged public information, will not be able to calculate the shared secret unless it has access to the private key of any of the communicating parties [1]. The two diplomacy connecting in the internet can exchange data between them in some encrypted format that the private data can’t be access by some third party until these two devices give the permission two exchanges of data [2,3]. |
The two most widespread uses in cryptography are, probably, to store data securely in a computer file or to transmit it across an insecure channel such as the Internet. In either scenario the fact that the document is encrypted does not prevent unauthorized people gaining entrée to it but, rather, ensures that they cannot comprehend what they see. |
The information to be secret is often called the operation of disguising it is known as encryption. The encrypted plaintext is called the cipher text or cryptogram and the set of rules used to encrypt information plaintext is the encryption algorithm. Usually the operation of this algorithm depends on an encryption key, which is input to the algorithm together with the message [3]. In order that the recipient can obtain the message from the cryptogram there has to be a decryption algorithm which, when used with the appropriate decryption key, reproduces the plaintext from the cipher text [4]. |
Cryptography is the science of manipulative of cipher systems, whereas cryptanalysis is the name given to the process of deducing information about plaintext from the cipher text without being given the appropriate key. Cryptology is the collective term for both cryptography and cryptanalysis [5,6,7]. |
Cryptography can be divided into two parts: |
a. Symmetric key cryptography or Private Key cryptography. |
b. Asymmetric key cryptography or Public Key cryptography. |
SALIENT FEATURES OF THE ALGORITHM |
Usually the text data are encrypted by the different known methods. Where some key, either they are public or private, are used to encrypt the cipher text. But here we have used the data compression method to encrypt the text. |
CONCLUSION |
Our approach is novel in the sense that no other algorithm exists that encrypts the text matter by the using of compression technique. The complexity of encryption is in the order of O(n2). And the decryption is of the order of exponential. We are trying for the newer approach for the same. |
References |
|