Nur Algorithm on Data Encryption and Decryption
-
Published:2018-05-07
Issue:2.26
Volume:7
Page:109
-
ISSN:2227-524X
-
Container-title:International Journal of Engineering & Technology
-
language:
-
Short-container-title:IJET
Author:
Aminudin Nur,Maseleno Andino,K Shankar,Hemalatha S,Sathesh kumar K,. Fauzi,Irviani Rita,Muslihudin Muhamad
Abstract
Security is a priority in information system, especially in the exchange of data that are important or confidential. The information to be given to the party entitled to the information must be properly safeguarded, don’t fall into the other hands who have no right to such information. One way to maintain the security of information exchanged in a system can be done using cryptographic techniques. Cryptography is the art and science to hide information from third parties. In cryptography a person who has a private key can convert plaintext data into unique and unreadable data (ciphertext) and can convert existing ciphertext into plaintext form by using its private key. System development (System Development Lifecycle) can mean to construct a new system to replace old system, combined with prototyping technique to build a cryptographic system using Nur algorithm which is implemented using programming language used is assembly (MASM32). In Nur Aminuddin's Encryptor there are two data-reading techniques namely encryption technique (the technique of converting data from the original into unreadable code) and decryption technique (the techniques of reading unreadable codes become readable) Encryption technique is built by applying technique of modern cryptography which holds secrecy on the symmetric key, so the security of encryption depends only on the key and does not depend on whether the algorithm is known to people or not.
Publisher
Science Publishing Corporation
Subject
Hardware and Architecture,General Engineering,General Chemical Engineering,Environmental Engineering,Computer Science (miscellaneous),Biotechnology
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Compatibility of leadership styles with information security in organizations;Serbian Journal of Engineering Management;2024
2. RSA Encryption and Decryption System;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2020-09-25
3. Optimal Data Hiding Key in Encrypted Images Based Digital Image Security in Wireless Sensor Networks;Lecture Notes in Electrical Engineering;2019
4. Introduction;Lecture Notes in Electrical Engineering;2019
5. Clustering Based Cybersecurity Model for Cloud Data;Advanced Sciences and Technologies for Security Applications;2019