Improving Source Code Encryption using Proposed Cipher Logic

Authors

  • SU Rasal Department of Computer Engineering, Bharati Vidyapeeth University College of Engineering, Pune, India
  • R Redhu Department of Computer Engineering, Bharati Vidyapeeth University College of Engineering, Pune, India
  • VS Rasal Department of Computer Engineering, Bharati Vidyapeeth University College of Engineering, Pune, India
  • ST Shelar surasal@bvucoep.edu.in

Keywords:

Cipher policy, Document Object Model (DOM),, source code, internet languages, web browser

Abstract

Web page is loaded into web browser to run the required output according to Document Object Model. Web page contents source based on applied technology like language support, platform required and versions used. Indirectly, data can be anything but it is always in the form of 0 and 1. In this paper, proposed cipher logic is applied to the bits data directly due to which it become universal supportive. Five levels proposed cipher logic has been added to the encryption process. Same logic is required to decrypt the encrypted data without which original data cannot be retrieved.

References

J. Bethencourt, A. Sahai, B. Waters, "Ciphertext-Policy Attribute-Based Encryption", 2007 IEEE Symposium on Security and Privacy (SP '07), Berkeley, pp. 321-334, 2007.

SU. Rasal, ST. Shelar, VS. Rasal, “Securing Internet Banking Using Multiple Attributes Scheme And OTP”, The IIOAB Journal, Vol.7, Issue.10, pp.26-30, 2016.

VS Rasal, SU Rasal, ST Shelar, “Enhancing Privacy And Security Through Mediator Using DCP-ABE With OTP”, The IIOAB Journal, Vol.7, Issue.1, pp.277-283, 2016.

S. Rasal, S. Relan, K. Saxena, “OTP Processing using UABE & DABE with Session management”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.6, Issue.5, pp.57-59, 2016.

VT. Mulik, K. Saritha, SU. Rasal, “Privacy Preserving Through Mediator in Decentralized Ciphertext policy Attribute Based Encryption”, IJRET: International Journal of Research in Engineering and Technology, Vol.5, Issue.6, pp. 535-540, 2016.

PJ. Lynch, S. Horton, “Web style guide”, New Haven: Yale University Press, US, pp.79-177, 2016.

Matthias Hertel, Yehuda Katz, Jon Gunderson, Lori Hylan-Cho, Prasanna Bale, MN. Hoyt, “Successful Deployment of Ajax and OpenAjax”, Open AJax alliance, Vol.1, Issue.1, pp.1-6, 2015.

S. Rasal, M. Matta, K. Saxena, “OTP system with third party trusted authority as a mediator”, International Journal Of Engineering And Computer Science, Vol.5, Issue.5, pp.16566-16568, 2016.

R. Sanders, “The Pareto principle: its use and abuse”, Journal of Services Marketing, Vol.1, Issue.2, pp.37-40, 1987.

I. Manotas, L. Pollock, J. Clause, “SEEDS: a software engineer's energy-optimization decision support framework”, In Proceedings of the 36th International Conference on Software Engineering, New York, pp.503-514, 2014.

Downloads

Published

2025-11-11

How to Cite

[1]
S. Rasal, R. Redhu, V. Rasal, and S. Shelar, “Improving Source Code Encryption using Proposed Cipher Logic”, Int. J. Comp. Sci. Eng., vol. 5, no. 4, pp. 93–96, Nov. 2025.

Issue

Section

Research Article