
PrasathSrinivasan Sushmitha Algorithm for String Encryption and Decryption | IJET – Volume 12 Issue 1 | IJET-V12I1P57

Table of Contents
ToggleInternational Journal of Engineering and Techniques (IJET)
Open Access • Peer Reviewed • High Citation & Impact Factor • ISSN: 2395-1303
Volume 12, Issue 1 | Published: February 2026
Author:Dr. J.S.Prasath, Ms. Sushmitha G S
DOI: https://zenodo.org/records/18744152 • PDF: Download
Abstract
Security is essential for communication of messages, data, and private information. Security threats and vulnerabilities increases rapidly due to the wide usage of wireless medium for data transmission. The sensitive data and private information transmitted across internet can be accessed and altered by the intruders. The security algorithms are important to ensure the communication of messages without unauthorized access and modification as well as to achieve data security. This proposed work is the development of novel cryptography suitable for encryption of text messages. This proposed algorithm encrypts the input string into ciphertext through series of mathematical operations. The inverse operation of encryption is performed at the receiver to obtain the original string from the ciphertext. This proposed cryptography can be utilized for preventing the theft and fraud in online money transactions, securing the email messages, file encryption, securing the web information, ensuring data confidentiality across internet, assuring data security in remote access, securing the patients information transmitted across wireless networks, enabling secure communication of country’s border information, preventing the credit card fraud, securing the industrial continuous varying process parameters, encryption of whatsapp messages, and securing the individual’s private information.
Keywords
Cryptography, Encryption, Decryption, Security, String
Conclusion
Internet is widely used for communicating the process data, private information, bank online transactions, patient’s health condition, border’s information, credit and debit card transactions. Intruders try to get access and misuse the private information which leads to loss of original data. Attackers can monitor the online transactions takes place across worldwide. They try to get the account details of individuals, and transfer the money in an unauthorized way. Due to this unauthorized transactions, bank customers losses their amount. Security is essential to maintain the sensitive data, messages, and information secret during transmission across internet. This proposed work is the novel encryption and decryption named PrasathSrinivasan Sushmitha algorithm for String Encryption and Decryption. This proposed algorithm involves series of mathematical operations to convert the input string into ciphertext. This ciphertext can be transmitted through internet across worldwide. Decryption is performed reverse of the encryption to convert the ciphertext into original string. The benefit of this proposed encryption algorithm is simple mathematical operations, and it assures confidentiality of data, private information, and messages. This proposed algorithm can be suitable for usage in wide range of applications including text encryption, securing online transactions of amount and account details, securing email messages, securing medical data related to patients, securing industrial process information, and securing the personal information.
References
[1] George S. Rizos, Konstantinos A. Draziotis, “Cryptographic primitives based on compact knapsack problem,” Journal of Information Security and Applications, Vol. 83, pp. 103781-103790, 2024.
[2] Li-Woei Chen, Kun-Lin Tsai, Fang-Yie Leu, Wen-Cheng Jiang, Shih-Ting Tseng, “Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications,” Computer Modeling in Engineering and Sciences, Vol. 140, No. 3, pp. 2779-2794, 2024.
[3] Abidemi Emmanuel Adeniyi, Rasheed Gbenga Jimoh, Joseph Bamidele Awotunde, “A systematic review on Elliptic Curve Cryptography algorithm for Internet of Things: Categorization, application areas, and security,” Computers and Electrical Engineering, Vol. 118, pp. 109330-109351, 2024.
[4] J.S.Prasath, V.Irine Shyja, P.Chandrakanth, B. Kiran Kumar, A. Raja Basha, “An optimal secure defense mechanism for DDoS attack in IoT network using feature optimization and intrusion detection system,” Journal of Intelligent and Fuzzy Systems, Vol. 46, No. 3, pp. 6517-6534, 2024.
[5] Nimish Mishra, SK Hafizul Islam, Sherali Zeadally, “A survey on security and cryptographic perspective of Industrial Internet of Things,” Internet of Things. Vol. 25, pp. 101037-101065, 2024.
[6] Mishall Al-Zubaidie, Raad A. Muhajjar, “Integrating Trustworthy Mechanisms to Support Data and Information Security in Health Sensors,” Procedia Computer Science, Vol. 237, pp. 43-52, 2024.
[7] Olusogo Popoola, Marcos Rodrigues, Jims Marchang, Alex Shenfield, Augustine
Ikpehai, Jumoke Popoola, “An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security,” Internet of Things, Vol. 27, pp. 101314-101351, 2024.
[8] Vatsal Vasani, Kumar Prateek, Ruhul Amin, Soumyadev Maity, Ashutosh Dhar
Dwivedi, “Embracing the quantum frontier: Investigating quantum communication, cryptography, applications and future directions,” Journal of Industrial Information Integration, Vol. 39, pp. 100594-100617, 2024.
[9] Ch. Jnana Ramakrishna, D. Bharath Kalyan Reddy, B.K. Priya, P.P Amritha, K.V Lakshmy, “Analysis of Lightweight Cryptographic Algorithms for IoT Gateways,” Procedia Computer Science, Vol. 233, pp. 235-242, 2024.
[10] Haochen Dou, Zhenwu Dan, Peng Xu, Wei Wang, Shuning Xu, Tianyang Chen, Hai Jin, “Dynamic Searchable Symmetric Encryption With Strong Security and Robustness,” IEEE Transactions on Information Forensics and Security, Vol. 19, pp. 2370 – 2384, 2024.
[11] K. Sasikumar, Sivakumar Nagarajan, “Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing,” IEEE Access, Vol. 12, pp. 52325 – 52351, 2024.
[12] Guowen Xu, Shengmin Xu, Jinhua Ma, Jianting Ning, Xinyi Huang, “An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud,” IEEE Transactions on Information Forensics and Security, Vol. 18, pp. 5171-5185, 2023.
[13] Lanxiang Chen, Yi Mu, Lingfang Zeng, Fatemeh Rezaeibagha, Robert H. Deng, “Authenticable Data Analytics over Encrypted Data in the Cloud,” IEEE Transactions on Information Forensics and Security, Vol. 18, pp. 1800-1813, 2023.
[14] Lei Xu, Xingliang Yuan, Zhengxiang Zhou, Cong Wang, Chungen Xu, “Towards Efficient Cryptographic Data Validation Service in Edge Computing,” IEEE Transactions on Services Computing, Vol. 16, No. 1, pp. 656-669, 2023.
[15] Changhee Hahn, Hyundo Yoon, Junbeom Hur, “Multi-Key Similar Data Search on Encrypted Storage With Secure Pay-Per-Query,” IEEE Transactions on Information Forensics and Security, Vol. 18, pp. 1169-181, 2023.
[16] Edward Keitaro Heru, Faisal, Hady Pranoto, “File Encryption Application using Menezes-Vanstone Elliptic Curve Cryptography Based on Python,” Procedia Computer Science, Vol. 227, pp. 651-658, 2023.
[17] Fairouz Beggas, Ali Lounici, “Generation of random sequences using DNA cryptography for OTP encryption,” Biosystems, Vol. 234, pp. 1050-1064, 2023.
[18] Kenan Begovic, Abdulaziz Al-Ali, Qutaibah Malluhi, “Cryptographic ransomware encryption detection: Survey,” Computers and Security, Vol. 132, pp. 1033-1049, 2023.
[19]Ankit Vishnoi, Alok Aggarwal, Ajay Prasad, Manish Prateek, Shalini Aggarwal, “Text encryption for lower text size: Design and implementation,” Materialstoday: Proceedings, Vol. 79, pp. 278-281, 2023.
[20] Shabana Urooj, Sonam Lata, Shahnawaz Ahmad, Shabana Mehfuz, S Kalathil, “Cryptographic Data Security for Reliable Wireless Sensor Network,” Alexandria Engineering Journal, Vol. 72, pp. 37-50, 2023.
[21] P. Ramadevi, S. Ayyasamy, Yalla Suryaprakash, Chunduru Anilkumar, S. Vijayakumar, R. Sudha, “Security for Wireless Sensor Networks using Cryptography,” Measurement: Sensors, Vol. 29, pp. 100874-100880, 2023.
[22] Heba Kadry, Ahmed Farouk, Elnomery A. Zanaty, Omar Reyad, “Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security,” Alexandria Engineering Journal, Vol. 71, pp. 491-500, 2023.
[23] Swetha Gadde, J. Amutharaj, S. Usha, “A security model to protect the isolation of medical data in the cloud using hybrid cryptography,” Journal of Information Security and Applications, Vol. 73, pp. 103412-103425, 2023.
[24] Rathnakar Achary, Chetan J Shelke, Kavin Marx, Aishwarya Rajesh, “Security Implementation on IoT using CoAP and Elliptical Curve Cryptography,” Procedia Computer Science, Vol. 230, pp. 493-502, 2023.
[25] D. Shivaramakrishna, M. Nagaratna, “A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management and Time-Limited access control,” Alexandria Engineering Journal, Vol. 84, pp. 275-284, 2023.
[26] M. Indrasena Reddy, M. Purushotham Reddy, R. Obulakonda Reddy, A. Praveen, “Improved elliptical curve cryptography and chaotic mapping with fruitfly optimization algorithm for secure data transmission,” Wireless Networks, Vol. 30, pp. 1151-1164, 2023.
[27] Qiuyun Tong, Yinbin Miao, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, “Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security,” IEEE Transactions on Knowledge and Data Engineering, Vol. 35, No. 5, pp. 5386 – 5399, 2023.
[28] Dajiang Chen, Hao Wang, Ning Zhang, Xuyun Nie, Hong-Ning Dai, Kuan Zhang, Kim-Kwang Raymond Choo, “Privacy-Preserving Encrypted Traffic Inspection with Symmetric Cryptographic Techniques in IoT,” IEEE Internet of Things Journal, Vol. 9, No. 18, pp. 17265-17279, 2022.
[29] Lei Zhang, Hu Xiong, Qiong Huang, Jiguo Li, Kim-Kwang Raymond Choo, Jiangtao Li, “Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities,” IEEE Transactions on Services Computing, Vol. 15, No. 1, pp. 57-587, 2022.
[30]Muhammad Nadeem, Ali Arshad, Saman Riaz, Syeda Wajiha Zahra, Shahab S. Band, Amir Mosavi, “Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks,” Computers, Materials and Continua, Vol. 74, No. 2, pp. 2625-2640, 2022.
[31] Piyush Garg, Dileep Kumar Singh, “Analysis of cryptographic encryption algorithm design to secure IoT devices: A review,” Materialstoday Proceedings, Vol. 51, pp. 810-814, 2022.
[32]Dilip Kumar Sharma, Ningthoujam Chidananda Singh, Daneshwari A Noola, Amala Nirmal Doss, Janaki Sivakumar, “A review on various cryptographic techniques and algorithms,” Materialstoday: Proceedings, Vol. 51, pp. 104-109, 2022.
[33] Malik Hamza Murtaza, Hasan Tahir, Shahzaib Tahir, Zahoor Ahmed Alizai, Qaiser Riaz, Mehdi Hussain, “A portable hardware security module and cryptographic key generator,” Journal of Information Security and Applications, Vol. 70, pp. 103332-103347, 2022.
[34] Yukun Zhou, Baidong Hu, Yitao Zhang, Weiming Cai, “Implementation of Cryptographic Algorithm in Dynamic QR Code Payment System and Its Performance,” IEEE Access, Vol. 9, pp. 122362-122372, 2021.
[35] Aleksandr Ometov, Krystof Zeman, Pavel Masek, Lukas Balazevic, Mikhail Komarov, “A Comprehensive and Reproducible comparison of Cryptographic Primitives Execution on Android Devices,” IEEE Access, Vol. 9, pp. 54625-54638, 2021.
[36] Jin Li, Yanyu Huang, Yu Wei, Siyi Lv, Zheli Liu, Changyu Dong; Wenjing Lou, “Searchable Symmetric Encryption with Forward Search Privacy,” IEEE Transactions on Dependable and Secure Computing, Vol. 18, No. 1, pp. 460-474, 2021.
[37] Mohammed Abbas Fadhil Al-Husainy, Bassam Al-Shargabi, Shadi Aljawarneh, “Lightweight Cryptography system for IoT devices using DNA,” Computers and Electrical Engineering, Vol. 95, pp. 107-117, 2021.
[38] Fursan Thabit, Sharaf Alhomdy, Abdulrazzaq H.A. Al-Ahdal, Sudhir Jagtap, “A new lightweight cryptographic algorithm for enhancing data security in cloud computing,” Global Transitions Proceedings, Vol. 2, No. 1, pp. 91-99, 2021.
[39] Cristian Chinas-Palacios, Jesus Aguila-Leon, Carlos Vargas-Salgado, Edith X. M. Garcia, Julian Sotelo-Castanon, Elías Hurtado-Perez, “A smart residential security assisted load management system using hybrid cryptography,” Sustainable Computing: Informatics and Systems, Vol. 32, pp. 1-10, 2021.
[40] Avijit Mondal, Radha Tamal Goswami, “Enhanced Honeypot cryptographic scheme and privacy preservation for an effective prediction in cloud security,” Microprocessors and Microsystems, Vol. 81, pp. 103719-103726, 2021.
[41] Danda B. Rawat, Ronald Doku, Moses Garuba, “Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security,” IEEE Transactions on Services Computing, Vol. 14, No. 6, pp. 2055 – 2072, 2021.
[42] J.S.Prasath, U.Ramachandraiah, G.Muthukumaran, “Modified Hardware Security Algorithms for Process Industries using Internet of Things,” Journal of Applied Security Research, vol. 16, No. 1, pp. 127-140, 2020.
[43] Hua Deng, Zheng Qin, Qianhong Wu, Zhenyu Guan, Robert H. Deng, Yujue Wang, Yunya Zhou, “Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud,” IEEE Transactions on Information Forensics and Security, Vol. 15, pp. 3168 – 3180, 2020.
[44] Shuguang Zhang, Hequn Xian, Zengpeng Li, Liming Wang, “SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating,” IEEE Access, Vol. 8, pp. 186323-186334, 2020.
[45] Yan Ke, Min-Qing Zhang, Jia Liu, Ting-Ting Su; Xiao-Yuan Yang, “Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 30, No. 8, pp. 2353 – 2365, 2020.
[46] J.S.Prasath, S. Jayakumar, K. Karthikeyan, “Real-Time Implementation for Secure monitoring of Wastewater Treatment Plants using Internet of Things,” International Journal of Innovative Technology and Exploring Engineering, vol. 9, no. 1, pp. 2997-3002, 2019.
[47] Mahdi H. Al Hasani, Kais A.Al Naimee, “Impact security enhancement in chaotic quantum cryptography,” Optics and Laser Technology, Vol. 119, pp. 1055-1075, 2019.
[48] Ge Wu, Fuchun Guo, Willy Susilo, “Generalized public-key cryptography with tight security,” Information Sciences, Vol. 504, pp. 561-577, 2019.
[49] Roderick Hodgson, “Solving the security challenges of IoT with public key cryptography,” Network Security, Vol. 2019, No. 1, pp. 17-19, 2019.
[50] Sunil Kumar, Manish Kumar, Rajat Budhiraja, M.K. Das, Sanjeev Singh, “A cryptographic model for better information security,” Journal of Information Security and Applications, Vol. 43, pp. 123-138, 2018.
[51] Gaurang Panchal, Debasis Samanta, “A Novel Approach to Fingerprint Biometric-Based Cryptographic Key Generation and its Applications to Storage Security,” Computers and Electrical Engineering, Vol. 69, pp. 461-478, 2018.
Cite this article
APA
Dr. J.S.Prasath, Ms. Sushmitha G S (February 2026). PrasathSrinivasan Sushmitha Algorithm for String Encryption and Decryption. International Journal of Engineering and Techniques (IJET), 12(1). https://zenodo.org/records/18744152
Dr. J.S.Prasath, Ms. Sushmitha G S, “PrasathSrinivasan Sushmitha Algorithm for String Encryption and Decryption,” International Journal of Engineering and Techniques (IJET), vol. 12, no. 1, February 2026, doi: https://zenodo.org/records/18744152.
