In the race towards the pinnacle of evolution and development, few things have come out on top and become the crucial weapon or path towards success. Information is one such thing. With the increased importance & plausible struggles over the accumulation of information to secure dominance & success, the concept of Information Security has emerged. Information Security is the process of protecting the information from unauthorized access and/or damage or misuse. Cryptography techniques are used for the purpose of making the exchange of information secure and confidential. It converts the sensitive information into a form which can't be understood by the unintended individuals. In this paper, we have tried to come up with a new algorithm which can be put to use for cryptographic purposes. The proposed algorithm is simple yet robust and will prove hard to crack unless one is not familiar with its inner workings.
[1]
Vijay Kumar,et al.
A Survey on Various Cryptography Techniques
,
2014
.
[2]
Mohammad Ubaidullah Bokhari,et al.
A Review on Symmetric Key Encryption Techniques in Cryptography
,
2016
.
[3]
Manoj Kumar,et al.
Optimized on System Analysis Using AES and X-tea
,
2013
.
[4]
S. Revathi,et al.
Performance Comparison of Various Clustering Algorithm
,
2013
.
[5]
Qahtan Makki,et al.
A Review on Symmetric Key Encryption Techniques in Cryptography
,
2016
.
[6]
Preeti Singh,et al.
Symmetric Key Cryptography: Current Trends
,
2014
.
[7]
Majdi Al-qdah,et al.
Simple Encryption/Decryption Application
,
2007
.