New Era of Micro Cipher Algorithm (MCA) : Cipher Text for any Length of Plaintext

Main Article Content

Ummadi Thirupalu, A. Rajasekhar Reddy, P. Chandrakanth

Abstract

Cipher text is text which is in an unreadable format. It is the text which is transmitted between the people as an exchange of secret messages. The secret message is also called cipher text. In General, the existing algorithm-generated cipher text size is equal to or greater than the actual plaintext. In a cryptosystem, there is a chance to reduce the cipher text. We introduce a new algorithm called “Micro Cipher Algorithm (MCA)” in this connection. It is an algorithm that produces a little bit of cipher text for any length of the plaintext. This feature achieves many things like unbreakable code, transmitting data through different kinds of networks and machines very easily and quickly (simply throughput) and storage of cipher at different machines as a minute. It also reduces congestion and increases throughput in a networking. throughput in networking.

Article Details

How to Cite
Ummadi Thirupalu, et al. (2023). New Era of Micro Cipher Algorithm (MCA) : Cipher Text for any Length of Plaintext. International Journal on Recent and Innovation Trends in Computing and Communication, 11(10), 241–246. https://doi.org/10.17762/ijritcc.v11i10.8485
Section
Articles
Author Biography

Ummadi Thirupalu, A. Rajasekhar Reddy, P. Chandrakanth

Ummadi Thirupalu1, A. Rajasekhar Reddy2, P. Chandrakanth3

1Computer Science and Engineering

ASCET,

Gudur,India

ummadi70@gmail.com

2Computer Science and Engineering

NBKR Institute of Science and Technology,

2rajareddy4u@rediffmail.com

3Computer Science and Engineering

NBKR Institute of Science and Technology,

3chandrakanthc4u@gmail.com

References

Yahia Alemami, Mohamad Afendee Mohamed, Saleh Atiewi, “Research on Various Cryptography Techniques”, International Journal of Resent Technology and engineering (IJRTE), Volume-8, Issue-283, July 2019.

Isnar Sumartono and Andysah Putera Utama Siahaan, “Encryption of DES Algorithm in Information Security”, International Journal for Innovative Research in Multidisciplinary Field, Volume – 4, Issue – 10, Oct – 2018.

Sarita Kumari, “A Research Paper on Cryptography Encryption and Compression Techniques”, International Journal of Engineering And Computer Science, Volume 6, Issue 4, April 2017, Page No. 20915-20919.

Indumathi Saikumar, “DES-Data Encryption Standard”, International Research Journal of Engineering and technology (IRJET), Volume: 04, Issue: 03, Mar-2017.

Isnar Sumartono, Andysah Putera Utama Siahaan, Nova Mayasari, “An Overview of RC4 Algorithm”, IOSR Journal of Computer Engineering (IOSR-JCE), Volume 18, Issue 6, Ver. IV (Nov – Dec. 2016). PP. 67-73.

“Security”, in Wikipedia, Wikimedia Foundation, 2016,

S. Artheeswari and Dr. RM. Chandrasekaran, “International Data Encryption Algorithm (Idea) For Data Security In Cloud”, International Journal of Technology and Engineering System (IJTES)”, Vol. 8, No.1 – Jan-March 2016, pp.06-11.

Rajdeep Bhanot and Rahul Hans, “A Review and Comparative Analysis of Various Encryption Algorithms”, International Journal of Security and its Applications (SCOPUS), Vol. 9. No. 4 (2015, pp. 389 – 306.

Benni Purnama, Hetty Rohayani.AH, “A New Modified Caesar Cipher Cryptography Method With Legible Ciphertext From A Message To Be Encrypted”, International Conference on Computer Science and Computational Intelligence (ICCSCI 2015), Procedia Computer Science, Vol. 59, pp. 195–204, 2015.

Poonam Jindal, Brahmjit Singh, “Performance Analysis of Modified RC4 Encryption Algorithm”, IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014.

Ashwak Alabaichi, Faudziah Ahmad and Ramlan Mahmod, “Security Analysis of Blowfish algorithm”, IEEE Conference Paper – September 2013.

Osama Almasri and Hajar Mat Jani, “Introducing an Encryption Algorithm based on IDEA”, International Journal of Science and Research (IJSR), Volume 2, Issue 9, pp. 334-339, September 2013.

NIST, “ADVANCED ENCRYPTION STANDARD (AES)”, Federal Information Processing Standards Publication (FIPS) 197, November 26, 2001.

Aamer Nadeem, Dr M. Younus Javed, “A Performance Comparison of Data Encryption Algorithms”, International Conference on Information and Communication Technology”, IEEE, pp. 84-89, 2005.

Chandra Kanth, P., & Anbarasi, M. S. (2020). A generic framework for data analysis in privacy-preserving data mining. In Computational Intelligence in Data Mining: Proceedings of the International Conference on ICCIDM 2018 (pp. 653-661). Springer Singapore.