42
From Table 1, we can observe that the value of the private key must be higher
when the number of characters is increased to assure the original message be
recovered. We can see that for some values of private key the recovering fails.
5 Conclusions
Associative models have been applied in classification, prediction, pattern recognition
and feature selection. In this paper we demonstrated that this approach can also be
applied in text encryption.
The algorithm is symmetric and it has a private key.
The original massage is recovered always: the number of characters is not a
limitation; however, the value of the private key must be increased if the number of
characters in the message is increased too.
Acknowledgments. The authors would like to thank the Instituto Politécnico
Nacional (COFAA, SIP and EDI), and SNI for their economic support to develop this
work. Ángel Martínez is grantee PIFI.
References
1. Stanoyevitch, A.: Introduction to Cryptography with mathematical foundations and
computer implementations. CRC Press, pp. 1−2 (2011)
2. McAndrew, A.: Introduction to Cryptography with open-source software. CRC Press, pp.
4−5 (2011)
3. Ayushi: A Symmetric Key Cryptographic Algorithm. International Journal of Computer
Applications (0975−8887) vol. 1(15) (2010)
4. Solanki,K. H., Patel, C. R.: New Symmetric Key Cryptographic algorithm for Enhancing
Security of Data. International Journal Of Research In Computer Engineering And
Electronics. vol. 1(3) (Dec 2012)
5. Mathur, A.: A Research paper: An ASCII value based data encryption algorithm and its
comparison with other symmetric data encryption algorithms. International Journal on
Computer Science and Engineering (IJCSE), vol. 4(9), Sep 2012, pp.1650−1657 (2012)
6. Kiran Kumar M., Mukthyar Azam, Shaik Rasool, S.: Efficient Digital Encryption
Algorithm Based On Matrix Crambling Technique. International Journal of Network
Security & Its Applications (IJNSA), vol. 2(4), October 2010, pp. 30−41 (2010)
7. Ramesh G., Umarani, R.: A Novel Symmetrical Encryption Algorithm with High
Security Based On Key Updating. International Journal of Communication Engineering
Applications-IJCEA, vol. 2(5), November-December 2011, pp. 329−341 (2011)
8. Buba, Z. P., Wajiga, G. M.: Cryptographic Algorithms for Secure Data Communication.
International Journal of Computer Science and Security (IJCSS), vol. 5(2), pp. 227−243
(2011)
9. Hameed, S., Riaz, F., Moghal, R., Akhtar, G., Ahmed, A., Dar, A. G.: Modified Advanced
Encryption Standard For Text And Images. Computer Science Journal vol. 1(3),
December 2011, pp. 120−129 (2011)
100
Elena Acevedo, Ángel Martínez, Marco Acevedo, Fabiola Martínez
Research in Computing Science 68 (2013)