7. CONCLUSION
Cryptography is used to achieve few goals like Confidentiality,
Data integrity, Authentication etc. of the send data
Now, in order to achieve these goals various cryptographic
algorithms are developed by various people. For a very minimal
amount of data those algorithms wouldn’t be cost effective since
those are not designed for small amount of data. The aim of this
work was to design and implement a new algorithm to address this
issue so that we don’t have to apply those algorithms (which are
not cost-effective) to encrypt a small amount of data. Keeping this
goal in mind the proposed algorithm has been designed in a quite
simple manner but of-course not sacrificing the security issues. A
single is used for both encryption and decryption i.e. it is fallen
under secret key cryptographic algorithm. But as public key
cryptography is more secured then secret key cryptography our
next task would be to develop and design a public key
cryptographic algorithm in a simple manner as it is done in this
paper