Encryption Decryption
Encryption Decryption
Lin Yi Hui
Faculty of Information Technology
Multimedia University
Cyberjaya, 63100, Malaysia
Abstract
1. INTRODUCTION
Encryption is the most effective way to achieve data security. The process of Encryption hides the
contents of a message in a way that the original information is recovered only through a
decryption process [1]. The purpose of Encryption is to prevent unauthorized parties from
viewing or modifying the data [2]. Encryption occurs when the data is passed through some
substitute technique, shifting technique, table references or mathematical operations. All those
processes generate a different form of that data. The unencrypted data is referred to as the
plaintext and the encrypted data as the ciphertext, which is representation of the original data in a
difference form [2].
Key-based algorithms use an Encryption key to encrypt the message. There are two general
categories for key-based Encryption: Symmetric Encryption which uses a single key to encrypt
and decrypt the message and Asymmetric Encryption which uses two different keys – a public
key to encrypt the message, and a private key to decrypt it. Currently, there are several types of
key based Encryption algorithms such as: DES, RSA, PGP, Elliptic curve, and others but all of
these algorithms depend on high mathematical manipulations [4, 5].
International Journal of Computer Science and Security, Volume (1) : Issue (1) 33
Majdi Al-qdah & Lin Yi Hui
One simple and good way to encrypt data is through rotation of bits or sometimes called bit
shifting. But, rotation of bits is more advanced than simple bit shifting. In rotation of bits operation,
the bits are moved, or shifted, to the left or to the right. The different kinds of shifts typically differ
in what they do with the bits [6]. Another way is to perform logical operation on the bits of the file
such as XOR operation. The idea behind XOR Encryption is that it is impossible to reverse the
operation without knowing the initial value of one of the two arguments [7].
2. PRELIMINARIES
There are several kinds of Encryption software in the market categorized by their functions and
target groups. For example, some are single Encryption applications for files and database
security; some are for messenger security or email Encryption applications that hide the actual
text in the medium between the sender and the receiver [8]. One of the first types of Encryption
was made by Julius Caesar. [9]. in his system, Caesar wrote B instead of A and C instead of B –
so to a sentence “ABC” will be written in “BCD” [6].
dsCrypt is AES/Rijndael file Encryption software with simple, multi-file, drag-and-drop operations.
It features optimal implementation, performance and safety measures. dsCrypt uses an advanced
Encryption algorithm and offers unique options for enhanced security[10].
NeoCrypt is a free, open-source File Protection Utility for Windows. It helps to protect sensitive
information easily by encrypting it with password or key. It yields fast, reliable and unbreakable
Encryption and supports many popular Encryption algorithms. All types of files can be encrypted
like Audio, Video, Documents and Executables programs [11].
Neekprotect is a software in the market right now with the ability to make Encryption on any files
in the window platform, a key is set when one try to encrypt a files and the key will be used again
when some one else trying to open the files been decrypted through decryption on the certain
files [12].NeekProtect is a good software operated under Microsoft window because of the
flexibility of this program’s advanced features integration such as double click, file icons, .npt file
extension etc.
This paper reports on a similar encryption technique that uses binary rotation of bits with XOR
logical operation using a custom made encryption key that operates on any type of a file.
3. METHODOLOGY
The main feature of the encryption/decryption program implementation is the generation of the
encryption key. Other features are related to the design of the GUI, progress of encryption
details, and user notification of the status of encryption.
International Journal of Computer Science and Security, Volume (1) : Issue (1) 34
Majdi Al-qdah & Lin Yi Hui
it to be an even or an odd character. For example, the character at position 0 is an even one
while the character at position 1 is an odd character. Similarly, position 2 is an even position
while position 3 is odd one. The even part of the key is combined together and the odd part of
the key is combined together. Finally, the two parts of the key are joined as an even part followed
by an odd part to produce one final encryption key. Since the final key is a key that consists of all
characters, another key with only ASCII values of each character is obtained. The result is a
very long decimal key. Figure 1 shows the complete key generation process.
START
Random Generation of
A (10 integers),
B (20 characters),
C (20 integers)
Key1 = A + B
(1 digit after 2 characters)
Key2 = key1 + C
(Combination)
Final key
END
International Journal of Computer Science and Security, Volume (1) : Issue (1) 35
Majdi Al-qdah & Lin Yi Hui
The above rules are summarized in the encryption chart shown in figure 2.
International Journal of Computer Science and Security, Volume (1) : Issue (1) 36
Majdi Al-qdah & Lin Yi Hui
START
No No
Key = 0 Key = 1 Key = 2
XOR
comparison
No
End of key?
Recycling key
Yes
No
End of file?
Yes
Finish
International Journal of Computer Science and Security, Volume (1) : Issue (1) 37
Majdi Al-qdah & Lin Yi Hui
4. RESULTS
The interface of the application is simple enough to be used by any user. Figure 3 shows the
interface with the encryption and a decryption buttons. The encryption is performed simply by
choosing any file while decryption is executed by choosing an encrypted file with an appropriate
key. Figure 4 and 5 shows a successful encryption and decryption, respectively.
International Journal of Computer Science and Security, Volume (1) : Issue (1) 38
Majdi Al-qdah & Lin Yi Hui
TABLE 1: Testing of the Application with Different Types and Sized Files.
File Types File Size(Mb) Encryption Time (S) Success Rate
Document 1/ 3/ 5 9/27/45 100%
Image 1/ 3/ 5 10/26/44 100%
Audio/ Video 1/ 3/ 5 18/28/45 100%
Zipped 1/ 3/ 5 10/25/44 100%
Exe. 1/ 3/ 5 12/27/48 100%
49.00
48.00
47.00
Time(S)
46.00
45.00
44.00
43.00
42.00
Document Image Audio Video Zipped Exe.
Files
FIGURE 6: Graphical view of the encryption time for different types of files.
International Journal of Computer Science and Security, Volume (1) : Issue (1) 39
Majdi Al-qdah & Lin Yi Hui
simplicity and availability proves that tools can be developed that fit the needs of an institution
without resorting to purchasing expensive software from the market. For future enhancement to
this application public key encryption can be applied where two keys can be generated: one to
encrypt a file using the public key and another private key to decrypt it. Also, other more
advanced encryption operations can be included to enhance the security of the application so that
it can be used to encrypt more sensitive administrative material in an institution.
7. REFERENCES
International Journal of Computer Science and Security, Volume (1) : Issue (1) 40