In Modern era, every business is dependent on the Internet. The Network is growing so quickly that now at this stage no one can ever imagine anything without use of internet. But at the same time security over network is very important because of the vulnerability of data to eavesdropping. To protect the data from eavesdropping, it must be appropriately encrypted before sending over the network. There are two types of algorithms, keyed and keyless, exist to protect data. The keyed algorithms are efficient but to avoid the overhead of key generation and key management, keyless algorithms are getting popularity now days. The proposed algorithm “Optimal Keyless Algorithm for Security” represents a new way of using data itself to create a protective shield. The algorithm provides security at both character level as well as bit level. The number of rounds and the number of shifts applied at bit level are made data dependent to increase the security level, is a major advantage of the algorithm. The system is proposed with the motive to provide highest security level with minimum execution time in terms of encryption and decryption. This paper presents simulation results of proposed algorithm and its comparison with the commonly used JS keyless algorithm. General Terms Security, Cryptography, Key, Keyless, Encryption, Decryption
[1]
Rahul Kumar Yadav,et al.
Cryptography on Android Message Applications - A Review
,
2013
.
[2]
Udepal Singh,et al.
An ASCII value based text data encryption System
,
2013
.
[3]
Chandra Prakash Dewangan,et al.
A Novel Approach to Improve Avalanche Effect of AES Algorithm
,
2012
.
[4]
Akhil Kaushik,et al.
Keyless User Defined Optimal Security Encryption
,
2012
.
[5]
Suparna Karmakar,et al.
An Approach for Ensuring Security and its Verification
,
2013
.
[6]
R. Umarani,et al.
A Survey on Various Most Common Encryption Techniques
,
2012
.
[7]
Zhe-Ming Lu,et al.
Power evaluation methods for data encryption algorithms
,
2014,
IET Softw..
[8]
S. Kavitha,et al.
KEYLESS USER DEFINED OPTIMAL SECURITY ENCRYPTION
,
2013
.
[9]
Sidra Malik.
A Novel Key-Based Transposition Scheme for Text Encryption
,
2011,
2011 Frontiers of Information Technology.