INTERNATIONAL JOURNAL OF TECHNOLOGY MANAGEMENT & HUMANITIES
Viewer Login | Editor Login
ISSN(ONLINE):2454-566X
Archive

Volume -1, Issue - 1

Volume -1, Issue - 2

Volume -1, Issue - 3

Volume -1, Issue - 4

Volume -2, Issue - 1

Volume -2, Issue - 2

Volume -2, Issue - 3

Volume -2, Issue - 4

Volume-3, Issue-1
 Inedexing
1.Indexd by International Innovative Journal Impact Factor(IIJIF)

2.Indexd by Global Impact Factor Organisation

3.Indexd by ResearchBib

4.Indexd by Root Indexing


Download
AUTHORS GUIDELINES FORM
COPYRIGHT FORM
PUBLICATION FEE FORM

Title:XOR Encryption/Decryption Algorithm
Abstract:Abstract: Encryption is the most effective way to achieve data security. The process of Encryption hides the contents of a message in a way that the original information is recovered only through a decryption process. The purpose of Encryption is to prevent unauthorized parties from viewing or modifying the data. Encryption occurs when the data is passed through some substitute technique, shifting technique, table references or mathematical operations. All those processes generate a different form of that data. The unencrypted data is referred to as the plaintext and the encrypted data as the cipher text, which is representation of the original data in a difference form. Key-based algorithms use an Encryption key to encrypt the message. One simple and good way to encrypt data is through rotation of bits or sometimes called bit shifting. But, rotation of bits is more advanced than simple bit shifting. In rotation of bits operation, the bits are moved, or shifted, to the left or to the right. The different kinds of shifts typically differ in what they do with the bits. Keyword: Encrypting, Decryption, Exclusive-OR (XOR) ,Gray scale image, Cipher image, Scrambled bit plane