This paper specifies cryptographic algorithm Hybridizing Traditional Technology (H.T.T) which may be used to protectsensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality andintegrity of the information represented by the data. The algorithms uniquely define the mathematical steps required to transformdata into a cryptographic cipher and also to transform the cipher back to the original form.The focus of the presentation will lie in presenting the symmetric and asymmetric algorithms, and specifics how it differs fromeach other.We propose a new algorithm Hybridizing Traditional Technology (H.T.T) which enables us to demonstrate its security against allknown types of attack. It is as fast as DES on the market leading Intel Pentium/MMX platforms (and at least as fast on manyothers); yet we believe it to be more secured than all other algorithms.Use of this algorithm has improved the hardware complexity and the rate of encryption/decryption. Similarities of encryption anddecryption are used to provide a high performance using an efficient architecture. The efficiency of the design is quite high due touse of short and balanced combinational paths in the design.
展开▼