A New Cryptography Algorithm Based on ASCII Code
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 9

Research Paper | Computer Science & Engineering | India | Volume 10 Issue 4, April 2021

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Encryption and Decryption is the encoding of information so that only those who have access to a password or encryption key can access it. Encryption protects data content, rather than preventing unauthorized interception of or access to data transmissions. It is used by intelligence and security organizations and in personal security software designed to protect user data. This paper introduces a new algorithm for cryptography to achieve a higher level of security. In this algorithm it becomes possible to hide the meaning of a message in unprintable characters. The main issue of this paper is to make the encrypted message undoubtedly unprintable using several random number key of ASCII conversions.

Keywords: Cryptography, Encryption and Decryption, Higher Level of Security, Unprintable Encrypted Message, ASCII Conversion

Edition: Volume 10 Issue 4, April 2021

Pages: 788 - 791

Share this Article

How to Cite this Article?

Yaser M.A. Abualkas, "A New Cryptography Algorithm Based on ASCII Code", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SR21418173413, Volume 10 Issue 4, April 2021, 788 - 791

Enter Your Email Address




Similar Articles with Keyword 'Cryptography'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 92

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS

Pranita Prakash Kulkarni

Share this Article

Similar Articles with Keyword 'Encryption Decryption'

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2704 - 2706

Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption

Minakshi B. Shingan, Sanchika A. Bajpai

Share this Article

Downloads: 145

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 279 - 283

A Comparative Study of AES Encryption Decryption

Gurpreet Kaur, Nishi Madaan

Share this Article



Top