29-03-2012, 02:43 PM
Simple Encryption
title paper.pdf (Size: 73.82 KB / Downloads: 147)
INTRODUCTION
Encryption is the most effective way to achieve data security. The process of Encryption hides the
contents of a message in a way that the original information is recovered only through a
decryption process [1]. The purpose of Encryption is to prevent unauthorized parties from
viewing or modifying the data [2]. Encryption occurs when the data is passed through some
substitute technique, shifting technique, table references or mathematical operations. All those
processes generate a different form of that data. The unencrypted data is referred to as the
plaintext and the encrypted data as the ciphertext, which is representation of the original data in a
difference form [2].
PRELIMINARIES
There are several kinds of Encryption software in the market categorized by their functions and
target groups. For example, some are single Encryption applications for files and database
security; some are for messenger security or email Encryption applications that hide the actual
text in the medium between the sender and the receiver [8]. One of the first types of Encryption
was made by Julius Caesar. [9]. in his system, Caesar wrote B instead of A and C instead of B –
so to a sentence “ABC” will be written in “BCD” [6].
METHODOLOGY
The main feature of the encryption/decryption program implementation is the generation of the
encryption key. Other features are related to the design of the GUI, progress of encryption
details, and user notification of the status of encryption.
3.1 Key Generation
A symmetric Encryption key is used for this application, which means the same key is shared for
both Encryption and decryption. A copy of the generated key is saved in a file named .ekf during
the Encryption process and the same key is used as the decryption key to retrieve the encrypted
file. The technique of generating the key uses two methods: random number generation and
combination. First, a long number with only digit values called A is generated.
Encryption Rules
For the Encryption method, a single digit in the decimal ASCII representation will decide which
Encryption method is to be applied to the single a binary block in a file.
I. 0 in the key means a rotation of bit to the left is performed and the next integer to 0 in the
ASCII code decides how many bits the block will be moved to the left.
II. 1 in the key means a rotation of bit to the right is performed and the next integer to 1 in
the ASCII code decides how many bits the block will be moved to the right.
III. 2 means the block will be passed to an XOR Encryption to be performed with a binary
block from the file.
IV. Else, all other numbers in the key like 3,4,5,6,7,8,9 are ignored.
CONSLUSION & FUTURE WORK
A new simple tool has been created, which is targeted for use inside of a small institution such as
a small university for lecturers’ daily use of sending exam files and sensitive material such that
the material can be encrypted and the file is sent in one e-mail while the encryption key is sent in
another e-mail or via any secure communication channel.