You are on page 1of 6

start

Admin Ge Key for Lo Establish conn. To Web Application of Central CSIR Server

If able to establish conn. Via TCP

Mail Sent Pairs

Y Enter Nodal Officers Registration

V i

Validate Officers Details

Nodal Officer credentials

Logins into A

Fig : Registration Routine

Fig: Key P

start

Input a +ve int , from RECV (PB KEY)

If int is (1255)

Generate Random Num. Dec Random Num -> Complement ->Dec Val (E) ( E) : Encryption Key

L1 PV KEY : r=(PB * E)/16 c=(PB * R)/16

PV KEY= rc

Send L1 PV key to receiver

end

Fig: L 1 Private Key

start

Input PV Key (rc)

Convert each byte into decimal

Decryption Computation : Dec Val: X=(16*c) +r Int Key : K1=( X/ PB KEY)

Convert K1-> Binary ->Complement

L1 PV KEY for Decryption

end

Fig: Receiver s End Computation

start

Input file name with ext. eg: abc.jpg

Consider array Q & R of size 16.

Q= {A,B,CQ} R= {/,#,$}

Convert file into corresponding byte code

If byte code is ve, convert to +ve

Compute for each byte code: n1=(BYTE_CODE/16) n2=(BYTE_CODE%16)

Compute q & r from n1 & n2 : q=(n1+k1)%16 r=(n2+k1)%16 k1=key value(INT VALUE)

Find q & r value from array Q & R respc.

Concatenate cipher of each byte to obtain cipher text

Output: Cipher file(Encrypted File)

start

Read input cipher file 2 bytes at a time

Split the byte code

Search array Q to obtain index of 1st byte & array R to obtain index of 2nd byte

Subtract the INT key value from each index value

If result is -ve

Y
Add array size to result

Compute Byte Code: (n1*16) + n2

Convert Byte Code to ASCII code

Save file with ext

end

You might also like