A Survey Paper on ASCII-Based Cryptographic Techniques


  • Abid Sultan School of Software, Dalian University of Technology, China
  • Yao Lin School of Software, Dalian University of Technology, China
  • Azhar Mushtaq Deparment of CS&IT University of Sargodha


Symmetric, Asymmetric, Encryption, Decryption, Memory Consumption, Complexity.


With the passage of time networking field has become much more advanced. Because of this advancement, the communicating parties don't want to rely on the third party for communication because a third party may misuse or share their personal information with someone else. That’s why there is a need for such a method at which we can rely on secure communication. In recent years a lot of cryptographic techniques based on ASCII values have been proposed, but selecting an efficient and effective technique from them is a big task. In this paper, we have made a comparison among several techniques based on certain parameters to find out the best one for the ease of the users.


U. Singh and U. Garg, “An ASCII value based text data encryption System,” vol. 3, no. 11, pp. 1–5, 2013.

A. Mathur, “A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms,” undefined, 2012.

R. Sultana and T. M. Kumari, “An ASCII Value based Optimized Text data,” pp. 6650–6656, 2016, doi: 10.15662/IJAREEIE.2016.0508008.

C. J. et al S.G. Rohini, “ASCII BASED SYMMETRIC KEY ALGORITHM FOR DATA SECURITY,” vol. 116, no. 5, pp. 75–80, 2017.

H. O. Alanazi, B. B. Zaidan, A. A. Zaidan, H. A. Jalab, M. Shabbir, and Y. Al-Nabhani, “New Comparative Study Between DES, 3DES and AES within Nine Factors,” vol. 2, Mar. 2010, doi: 10.48550/arxiv.1003.4085.

Y. Takeuchi, D. Takafuji, Y. Ito, and K. Nakano, “ASCII art generation using the local exhaustive search on the GPU,” Proc. - 2013 1st Int. Symp. Comput. Networking, CANDAR 2013, pp. 194–200, 2013, doi: 10.1109/CANDAR.2013.35.

D.-E.-S. Agha, S. Ali Khan, H. Fakhruddin, and H. H. Rizvi, “Security Enhancing by using ASCII Values and Substitution Technique for Symmetric Key Cryptography,” Indian J. Sci. Technol., vol. 10, no. 36, pp. 1–6, Sep. 2017, doi: 10.17485/IJST/2017/V10I36/119181.

R. K. Veerpal Kaur, “An Advanced Text Encryption & Compression System Based on ASCII Values & Arithmetic Encoding to Improve Data Security,” vol. 3, no. 4, 2015, Accessed: Sep. 13, 2022. [Online]. Available: https://www.academia.edu/8628575/An_Advanced_Text_Encryption_and_Compression_System_Based_on_ASCII_Values_and_Arithmetic_Encoding_to_Improve_Data_Security

M. Lavanya, R. Vijay Sai, A. Festina, J. Eshwari, T. Manopriya, and V. Vaithiyanathan, “An encryption algorithm functioning on ASCII values and random number generation,” Indian J. Sci. Technol., vol. 8, no. 35, Dec. 2015, doi: 10.17485/IJST/2015/V8I35/86673.

E. S. Arya and A. Kumar, “Ascii Based Encryption Decryption Technique for Information Security and Communication,” 3rd Int. Conf. Innov. trends Sci. Eng. Manag. YMCA connaught place, New Delhi, 7th January, pp. 25–33, 2017.

D. D. and P. P., “Modern Encryption and Decryption Algorithm based on ASCII Value and Binary Operations,” Int. J. Comput. Appl., vol. 172, no. 1, pp. 30–34, 2017, doi: 10.5120/ijca2017915060.

M. H. Moon, M. P. Uddin, M. I. Afjal, M. Al Mamun, M. A. Marjan, and M. Nitu, “A Cryptographic Algorithm Based on ASCII and Number System Conversions along with a Cyclic Mathematical Function,” 5th Int. Conf. Comput. Commun. Chem. Mater. Electron. Eng. IC4ME2 2019, Jul. 2019, doi: 10.1109/IC4ME247184.2019.9036706.

K. Goyal, T. Kumar, D. Garg, and P. Thakral, “Cryptography : A Game Play Using ASCII Conversion,” no. March 2019, 2018.

Y. Nanjo, M. A. A. Khandaker, T. Kusaka, and Y. Nogami, “Efficient pairing-based cryptography on raspberry Pi,” J. Commun., vol. 13, no. 2, pp. 88–93, 2018, doi: 10.12720/jcm.13.2.88-93.

S. Yan, P. Zhen, and L. Min, “Provably secure public key cryptosystem based on chebyshev polynomials,” J. Commun., vol. 10, no. 6, pp. 380–384, 2015, doi: 10.12720/jcm.10.6.380-384.

S. R. Shinge and R. Patil, “An Encryption Algorithm Based on ASCII Value of Data,” Int. J. Comput. Sci. Inf. Technol., vol. 5, no. 6, pp. 7232–7234, 2014.

M. M. Rahman, “Any File Encryption by Translating ASCII Value of Characters,” Int. J. Adv. Res. Comput. Sci., vol. 3, no. 2, pp. 41–43, 2012, doi: 10.26483/IJARCS.V3I2.1032.

D. Vegad, “Character Based Encryption and Decryption using Modulo Arithmatic,” vol. 1, no. 10, pp. 57–60, 2015.

F. Qazi, F. H. Khan, K. N. Kiani, S. Ahmed, and S. A. Khan, “Enhancing the Security of Communication Using Encryption Algorithm Based on ASCII Values of Data,” Int. J. Secur. Its Appl., vol. 11, no. 2, pp. 59–68, 2017, doi: 10.14257/ijsia.2017.11.2.06.

V. G. et al Hardik Gandhi, “A Research on Enhancing Public Key Cryptography by the Use of MRGA with RSA and N-Prime RSA,” vol. 1, no. 12, 2015, Accessed: Sep. 13, 2022. [Online]. Available: https://www.academia.edu/16075924/A_Research_on_Enhancing_Public_Key_Cryptography_by_the_Use_of_MRGA_with_RSA_and_N_Prime_RSA

A. Olkar, “ASCII Based Text Encryption and Decryption With Check For Data Integrity,” vol. 4, no. 12, pp. 10–12, 2015, doi: 10.17148/IJARCCE.2015.412109.

K. KumarPandey, V. Rangari, and S. Kumar Sinha, “An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security,” Int. J. Comput. Appl., vol. 74, no. 20, pp. 29–33, 2013, doi: 10.5120/13028-0215.

W. Zhang, Y. Zhao, and S. Fan, “Cryptosystem Identification Scheme Based on ASCII Code Statistics,” Secur. Commun. Networks, vol. 2020, 2020, doi: 10.1155/2020/8875864.

B. Dhanuja, B. Prabadevi, K. Bhavani Shankari, and G. Sathiya, “E-REA Symmetric Key Cryptographic Technique,” Int. Conf. Emerg. Trends Inf. Technol. Eng. ic-ETITE 2020, Feb. 2020, doi: 10.1109/IC-ETITE47903.2020.38.

K. Gupta and S. Singh, “DNA Based Cryptographic Techniques: A Review,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 3, no. 3, p. 2277, 2013, doi: 10.6633/IJNS.201811.

N. A. N. Abdullah et al., “a Theoretical Comparative Analysis of Dna Techniques Used in Dna Based Cryptography,” J. Sustain. Sci. Manag., vol. 17, no. 5, pp. 165–178, 2022, doi: 10.46754/jssm.2022.05.014.

M. Faheem, S. Jamel, A. Hassan, Z. A., N. Shafinaz, and M. Mat, “A Survey on the Cryptographic Encryption Algorithms,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 11, 2017, doi: 10.14569/ijacsa.2017.081141.

D. Garg, K. K. Bhatia, and S. Gupta, “A novel Genetic Algorithm based Encryption Technique for Securing Data on Fog Network Using DNA Cryptography,” Proc. 2nd Int. Conf. Innov. Pract. Technol. Manag. ICIPTM 2022, pp. 362–368, 2022, doi: 10.1109/ICIPTM54933.2022.9754031.

P. Dixit, A. K. Gupta, M. C. Trivedi, and V. K. Yadav, “Traditional and hybrid encryption techniques: A survey,” Lect. Notes Data Eng. Commun. Technol., vol. 4, no. June, pp. 239–248, 2018, doi: 10.1007/978-981-10-4600-1_22.

N. Saqib and S. S. Shekhawat, “Securing Wireless Sensor Networks Using Elliptic Curve Cryptography,” Int. J. Eng. Trends Technol., vol. 56, no. 1, pp. 7–11, 2018, doi: 10.14445/22315381/ijett-v56p202.

S. Kumar, M. S. Gaur, P. Sagar Sharma, and D. Munjal, “A Novel Approach of Symmetric Key Cryptography,” Proc. 2021 2nd Int. Conf. Intell. Eng. Manag. ICIEM 2021, pp. 593–598, Apr. 2021, doi: 10.1109/ICIEM51511.2021.9445343.




How to Cite

Sultan, A., Lin, Y. ., & Mushtaq , A. . (2022). A Survey Paper on ASCII-Based Cryptographic Techniques. International Journal of Innovations in Science & Technology, 4(4), 1087–1098. Retrieved from https://journal.50sea.com/index.php/IJIST/article/view/400