International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 1246
ISSN 2229-5518
Encryption of Data into a New Pattern Which
Depends on Password Content Set by User
Uday Bhaskar
—————————— ——————————
To ensure privacy and security the data must be encrypted in a format that is none discoverable by outside programs or people. The encryption includes conversion from one format to other. This includes conversion to a new proposed format, ASCII codes and gray codes. The encryption and decryption of data is easy if one knows the method along-with the password. The password defines the way in which the data is to encrypted. From the contents of password only the encryption type is to be encrypted.
As being a Computer Science and Engineering Student I became familiar with the field of encryption and Cryptography. As all of us have used password protected system to secure our private and confidential data. I always thought of designing our own Secure and encrypted system.
————————————————
Here is the new proposed method of encryption, the whole method is proposed in 4 steps stated below.
A. Step 1 :- A new format is proposed based on the no. of bits to be included i.e. M and the real number which is to be used for defining the format denoted by N and K= length of password.
M – 2,3,4 and so on. N -
2,3,4,5,6… so on
The value of N and M depends on the password content set by user, if password length is 8 characters then M=2, N=6, we calculate M=3 & N=6 for K=9 using formula stated below.
Password length is Restricted between 8 characters to 16 characters and for K=8 we have N=M=4 as predefined.
Example:- Let the sentence be “DEFINE”
Each letter in the Sentence above has its own ASCII code and they are
ASCII CODE:- 68 69 70 73 78 69
If we take M=3 and N=4 , then the above code is converted
to
68 = “2112”, 69 = “2120”, 70 = “2121”, 78= “2220” So, DEFINE = 2112-2120-2120-2121-2220
For M=4 and N=4, we have
DEFINE = 1010-1011-1012-1021-1032-1011
The format for Values of M = 4 and N = 3, 4 and N= 5 & M=3 respectively as follows.
IJSER © 2013 http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 1247
ISSN 2229-5518
TABLE 1(M=4 & N=3)
(27) (9) (3) (1)
TABLE 2(M=4 & N=4)
64 16 4 1
TABLE 3(M=3 & N=5)
25 5 1
M has four bits namely M1 , M2,M3, M 4 .
To calculate the value of Decimal from given values of N, M1 , M2, M3, M 4 one need to calculate using the formula
The formula to calculate the total no. of decimal values for specified values of N and M is [MN-1 ]
.Gray code is a 4-bit code which can be converted to Binary
Coded Decimal and Decimal format using the Table 4 given below. For example, the code obtained from above step is as follows:-
IJSER © 2013 http://www.ijser.org
TABLE 4
Conversion Table of BCD & Gray Code
International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 1248
ISSN 2229-5518
Now we proceed by converting to gray code after obtaining result from step 1.
From Step1, DEFINE = “1010-1011-1012-1021-1032-1011”
for M=4 and N=4.
On converting to gray code, the following code is obtained:- DEFINE:-“0001000000010000-00010000000100010001-
0001000000010011-
0001000000010011-0001000000100011-0001000000010001”
C. STEP 3 :- Finally every two bit is converted to 0,1,2,3 depending on input. If we take 00 it is converted to 0 using TABLE 5. This will make the encryption more precise and reduce the 16 bit format to 8 bit format and the final code obtained will consist of only four bits 0,1,2,3 .
TABLE 5
Now we convert the above result obtained from Step2 by selecting 2bit in pair using the above table
DEFINE= “010001000100010101000103010001030100020301000101”
DEFINE= “010001000100010101000103010001030100020301000101”
To decrypt the code just follow the reverse order for the steps involved in encryption:-
Step1 :- Each bit is to converted to 2 bit using table 5 .
Step2 :-Then convert the gray code obtained from step1 to
BCD using table 4.
Step3:- Then convert to ASCII code by taking group of 4 Bit.
Step4:- From ASCII code obtained in Step3 convert to original data.
The main motive of this method is to provide secure encrypted code for the files and data in it. It will help to secure confidential and private data. I proposed this idea to give a new way of encryption. This encryption code is more reliable and efficient.
I would like to thank everybody who supported me in completing this project, the authors for their references and specially God for providing an opportunity to do so. Special thank to my teachers, Parents and friends.
[1] http://en.wikipedia.org/wiki/Encryption
[2] http://en.wikipedia.org/wiki/Ascii
[3] http://en.wikipedia.org/wiki/Gray_code
[4] http://en.wikipedia.org/wiki/Cryptography
IJSER © 2013 http://www.ijser.org