Hiding of information over the internet and sharing secret information is becoming impossible owing to the continuous increase in hacking cases and also the number of hackers. Cryptography is a method that tries to help in that regard. It converts the information from one type to another i.e it encrypts the information. This paper provides an innovative way of encrypting information by making use of some trigonometric relations. A key is passed between the sender and receiver and can be done using any method, an example being the Diffie-Hellman method. The entire data is taken as characters and broken to American Standard Code for Information Interchange (ASCII) values. The key is taken and a modulus operation is performed with 360. The output say ‘x’, obtained is going to be used for the later transformations. Now the entire data which has been converted to ASCII will be broken to 8 blocks of which at least 7 will be of equal size in terms of digits. Then 2 consecutive blocks will form a pair of coordinates. We will have 4 such pairs. Each pair is then rotated using trigonometric rotation transformation using ‘x’ as the angle. Then all the pairs are merged to get a new set of values. Then ASCII to character conversion is used, but this time to convert the data to encrypted form.
[1]
Asoke Nath,et al.
A New Symmetric Key Cryptography Algorithm Using Extended MSA Method: DJSA Symmetric Key Algorithm
,
2011,
2011 International Conference on Communication Systems and Network Technologies.
[2]
Ayushi.
A Symmetric Key Cryptographic Algorithm
,
2010
.
[3]
Javier Sanchez,et al.
Encryption techniques: A theoretical overview and future proposals
,
2016,
2016 Third International Conference on eDemocracy & eGovernment (ICEDEG).
[4]
Paul C. van Oorschot,et al.
Authentication and authenticated key exchanges
,
1992,
Des. Codes Cryptogr..
[5]
Chanathip Namprempre,et al.
From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security
,
2008,
IEEE Transactions on Information Theory.
[6]
Shreyank N. Gowda,et al.
Innovative enhancement of the Caesar cipher algorithm for cryptography
,
2016,
2016 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Fall).