Acta Scientific Computer Sciences

Research Article Volume 4 Issue 4

Character Shift and XOR String Cryptography

Terry Watson, David Montes De Oca and Kanwalinderjit Kaur Gagneja*

Department of Computer and Electrical Engineering and Computer Science California State University, Bakersfield, USA

*Corresponding Author: Kanwalinderjit Kaur Gagneja, Department of Computer and Electrical Engineering and Computer Science California State University, Bakersfield, USA.

Received: December 14, 2021; Published: March 17, 2022

Abstract

In current computing methods, encryption is widely used and highly valued. Encryption complexity has developed and progressed greatly since the creation of the Internet. This is mainly due to the higher demand for security and privacy amongst the Internet's users. The increase in demand for security has also led to an increase in demand for services capable of breaking this security. That led to the race of encryption vs. code-breaking. Modern encryption methods are highly advanced and difficult to break but come with the caveat of needing higher and higher processing power and time to complete, especially on large data sets. Thereby necessitating a new approach. The proposed approach uses the character shift to decrease the time it takes for an encryption approach to complete in a distributed way. This approach requires long strings of characters and shifting them/transforming them to properly show that this methodology saves time.


Keywords: Cryptography; Distributed Encryption; Time; Runtime; Code-breaking

References

  1. Elena Andreeva., et al. "Forkcipher: A New Primitive for Authenticated Encryption of Very Short Messages”. Lecture Notes in Computer Science Advances in Cryptology - ASIACRYPT (2019): 153-182.
  2. Liu Ruihua and Tu Fengsheng. "A control policy for fork-join queueing network”. Proceedings of 1995 34th IEEE Conference on Decision and Control (1995): 3648-3649 vol.4.
  3. R A Ammar and R Todd. "A design methodology to develop efficient fork-join structures”. Proceedings Second IEEE Symposium on Computer and Communications (1997): 601-608.
  4. J Chandrasekaran and T S Jayaraman. "A fast and secure image encryption algorithm using number theoretic transforms and discrete logarithms”. 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES) (2015): 1-5.
  5. “Linux Programmer's Manual” (2020).
  6. "ASCII Table and Description”. Ascii Table - ASCII character codes and html, octal, hex and decimal chart conversion (2020).
  7. L Wagner. "Why is Exclusive Or (XOR) Important in Cryptography? - Qvault". Qvault (2020).
  8. M Lewin. "All about XOR". ACCU professionalism in programming 20.109 (2012): 14-19.
  9. Gagneja KK and Nygard K. "Key Management Scheme for Routing in Clustered Heterogeneous Sensor Networks”. IEEE NTMS 2012, Security Track, Istanbul, Turkey): 1-5, 7-10 May (2012).
  10. Tirado E., et al. "A New Distributed Brute-Force Password Cracking Technique”. Future Network Systems and Security, FNSS Communications in Computer and Information Science 878 (2018): 117-127.
  11. K K Gagneja., et al. "Tabu-Voronoi Clustering Heuristics with Key Management Scheme for Heterogeneous Sensor Networks”. IEEE ICUFN 2012, Phuket, Thailand (2012): 46-51, July 4-6.
  12. Kanwalinderjit Kaur Gagneja and Riley Kiefer. "IoT Devices with Non-interactive Key Management Protocol”. 2020 Sixth International Conference on Mobile And Secure Services, MobiSecServ 2020, Miami, USA, (2020).
  13. Todd Robert. “Performance-Based Quality Measures for Parallel Software Design”. Phd Dissertation, in preparation, (1994).

Citation

Citation: Kanwalinderjit Kaur Gagneja., et al. “Character Shift and XOR String Cryptography". Acta Scientific Computer Sciences 4.4 (2022): 48-55.

Copyright

Copyright: © 2022 Kanwalinderjit Kaur Gagneja., et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.




Metrics

Acceptance rate35%
Acceptance to publication20-30 days

Indexed In




News and Events


  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is July 10, 2022.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of “Best Article of the Issue”.
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.
  • Contact US