International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064




Downloads: 12

Research Paper | Computer Science and Information Technology | India | Volume 10 Issue 6, June 2021


Asymmetric New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas [2] | Arshed Raad Raheem


Abstract: Encryption is a process of generating secret text from the input text using a secret key and a encryption algorithm. Input text is referred to as plain text and the secret text generated is known as cipher text. Encryption algorithms are mainly divided into two categories which are symmetric key encryption algorithm and asymmetric key encryption algorithm. In Symmetric key encryption algorithm the same key is used by both sender and receiver but in asymmetric key algorithms use different keys for encryption and decryption. The keys are: Private Key and Public Key. The encryption key is public, decryption key is secret. Anyone can encrypt a message but only the one who knows the corresponding private key can decrypt it. The decryption key cannot be derived from the encryption key. Asymmetric key algorithms used for transmitting encryption keys or other data securely even when the parties have no opportunity to agree on a secret key in private. In this paper, we present a technique based on asymmetric key encryption algorithm which uses ASCII vales of input text to encrypt the data. Text data encryption techniques are very useful in data communication where one user want to send some secret messages to another users.


Keywords: Encryption, Decryption, ASCII con, Symmetric Encryption, Plain Text, Cipher Text, Cryptography, Diffie-Hellman , RSA, ElGamal, ECC, DSA


Edition: Volume 10 Issue 6, June 2021,


Pages: 1 - 4

Asymmetric New Cryptography Algorithm Based on ASCII Code


How to Cite this Article?

Yaser M.A. Abualkas, Arshed Raad Raheem, "Asymmetric New Cryptography Algorithm Based on ASCII Code", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SR21528214956, Volume 10 Issue 6, June 2021, 1 - 4, #ijsrnet

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Encryption'

Downloads: 0

Research Paper, Computer Science and Information Technology, Kenya, Volume 11 Issue 2, February 2022

Pages: 401 - 405

Security Measures for Protecting of Information Technology Assets

Masese Nelson

Share this Article

Downloads: 1

Research Paper, Computer Science and Information Technology, India, Volume 11 Issue 1, January 2022

Pages: 359 - 363

Arithmetic Addition Coding and Linear Invertible Equation using Prime Modulo with Multiplicative Inverse for Text Encryption

N. Subramanyan | Dr. K. Arunesh

Share this Article


Top