Main Article Content
Cipher text is text which is in an unreadable format. It is the text which is transmitted between the people as an exchange of secret messages. The secret message is also called cipher text. In General, the existing algorithm-generated cipher text size is equal to or greater than the actual plaintext. In a cryptosystem, there is a chance to reduce the cipher text. We introduce a new algorithm called “Micro Cipher Algorithm (MCA)” in this connection. It is an algorithm that produces a little bit of cipher text for any length of the plaintext. This feature achieves many things like unbreakable code, transmitting data through different kinds of networks and machines very easily and quickly (simply throughput) and storage of cipher at different machines as a minute. It also reduces congestion and increases throughput in a networking. throughput in networking.
Yahia Alemami, Mohamad Afendee Mohamed, Saleh Atiewi, “Research on Various Cryptography Techniques”, International Journal of Resent Technology and engineering (IJRTE), Volume-8, Issue-283, July 2019.
Isnar Sumartono and Andysah Putera Utama Siahaan, “Encryption of DES Algorithm in Information Security”, International Journal for Innovative Research in Multidisciplinary Field, Volume – 4, Issue – 10, Oct – 2018.
Sarita Kumari, “A Research Paper on Cryptography Encryption and Compression Techniques”, International Journal of Engineering And Computer Science, Volume 6, Issue 4, April 2017, Page No. 20915-20919.
Indumathi Saikumar, “DES-Data Encryption Standard”, International Research Journal of Engineering and technology (IRJET), Volume: 04, Issue: 03, Mar-2017.
Isnar Sumartono, Andysah Putera Utama Siahaan, Nova Mayasari, “An Overview of RC4 Algorithm”, IOSR Journal of Computer Engineering (IOSR-JCE), Volume 18, Issue 6, Ver. IV (Nov – Dec. 2016). PP. 67-73.
“Security”, in Wikipedia, Wikimedia Foundation, 2016,
S. Artheeswari and Dr. RM. Chandrasekaran, “International Data Encryption Algorithm (Idea) For Data Security In Cloud”, International Journal of Technology and Engineering System (IJTES)”, Vol. 8, No.1 – Jan-March 2016, pp.06-11.
Rajdeep Bhanot and Rahul Hans, “A Review and Comparative Analysis of Various Encryption Algorithms”, International Journal of Security and its Applications (SCOPUS), Vol. 9. No. 4 (2015, pp. 389 – 306.
Benni Purnama, Hetty Rohayani.AH, “A New Modified Caesar Cipher Cryptography Method With Legible Ciphertext From A Message To Be Encrypted”, International Conference on Computer Science and Computational Intelligence (ICCSCI 2015), Procedia Computer Science, Vol. 59, pp. 195–204, 2015.
Poonam Jindal, Brahmjit Singh, “Performance Analysis of Modified RC4 Encryption Algorithm”, IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014.
Ashwak Alabaichi, Faudziah Ahmad and Ramlan Mahmod, “Security Analysis of Blowfish algorithm”, IEEE Conference Paper – September 2013.
Osama Almasri and Hajar Mat Jani, “Introducing an Encryption Algorithm based on IDEA”, International Journal of Science and Research (IJSR), Volume 2, Issue 9, pp. 334-339, September 2013.
NIST, “ADVANCED ENCRYPTION STANDARD (AES)”, Federal Information Processing Standards Publication (FIPS) 197, November 26, 2001.
Aamer Nadeem, Dr M. Younus Javed, “A Performance Comparison of Data Encryption Algorithms”, International Conference on Information and Communication Technology”, IEEE, pp. 84-89, 2005.
Chandra Kanth, P., & Anbarasi, M. S. (2020). A generic framework for data analysis in privacy-preserving data mining. In Computational Intelligence in Data Mining: Proceedings of the International Conference on ICCIDM 2018 (pp. 653-661). Springer Singapore.