Enhance Security of Playfair Matrix Using Two 12X8 Playfair Matrix
|
|
- Doreen Octavia Campbell
- 5 years ago
- Views:
Transcription
1 Enhance Security of Playfair Matrix Using Two 12X8 Playfair Matrix Pavan Kumar*, Vedant Rastogi** Department of Computer Science & Engineering IET, Alwar - ABSTRACT In the last some decades in digital world, communication of information is very hazardous in the charisma of the third party on internet. There cryptography is used to safe and sound information in order to offer the solitude for the planned sender as well as receiver by managing the message with the Symmetric and Asymmetric key cryptography. The purpose of this work is to securing the message (cipher text) of playfair technique of size12x8 using second matrix of same size of 12X8. It s in two-part algorithm. In I st stage existing playfair cipher customized by mounting in size of matrix, so that restrictions of former works of playfair (PF) cipher using 5 5 matrix were conquer in proposed work. In this proposed scheme, use a 12 8 matrix that contains many alphabetic, numeric and special character use as input. This work is an step up to existing algorithms that uses 5 5 matrix to pick cipher characters. It makes use of alphabets both type lower case as well as upper case characters, number as well as special characters on behalf of constructing the contents of the matrix and after this we use the rotation factor to turn around the matrix. In II nd stage, we check the position of plain text in second matrix and make cipher text by it. This cipher text is sent to receiver end, at receiver end receiver check the position of this cipher text in second matrix and saves theses position and gets the plain text by seeing these positions in this first matrix. By these matrixes we can decrypt this cipher text and get plain text finally, security strength of whole system has been analyzed and tried to fulfill necessity of security. At the last, dissertation presents the scope for further work and concludes the dissertation. Keywords: Playfair=PF, Plaintext=PT, Plaintext1=PT1, Plaintext2=PT2, Cipher text= CT, Cipher text1= CT1, Cipher text2= CT2, Encryption Technique=ET, Decryption Technique=DT 1. INTRODUCTION 1.1 Introduction about PlayfairTechnique The basic Playfair cipher uses a matrix of 5 5 containing a key or phrase. Memorization of the key is achieved by generating a 5 5 key table and cipher text is created by applying four simple rules on this key table [1]. To generate the key table, one would first fill in the spaces in the table with the letters of the key (dropping any duplicate letters), then fill the remaining spaces with the rest of the letters of the alphabet in order (usually omitting "Q" to reduce the alphabet to fit; other versions put both "I" and "J" in the same space) [1]. The key can be written in the top rows of the table, from left to right, or in some other pattern, such as a spiral beginning in the upper-lefthand corner and ending in the center. The key together with the conventions for filling in the 5 5 table constitute the cipher key [1]. To encrypt a message, one would break the message into digraphs (groups of 2 letters) for example; "HELLO WORLD" becomes "HE, LL, OW, OR, LD", and maps them out on the key table. If needed, append a "Z" to complete the final digraph. The two letters of the digraph are considered as the opposite corners of a rectangle in the key table [2]. Note the relative position of the corners of this rectangle. Then apply the following 4 rules, in Page 1 of 10
2 order, to get encrypted message for each pair of letters in the PT [1] Rules for making CT using PF Matrix 1. Add an "X" after the first letter, if both letters are the same (or only one letter is left). Encrypt the new pair and continue doing this. Some variants of PF use "Q" instead of "X", but any uncommon monograph will do. 2. If both alphabets appear on the same row in table, replace them with the letters to their immediate right respectively (wrapping around to the left side of the row if a letter in the original pair was on the right side of the row). 3. If both alphabets appear on the same column in table, replace them with the letters immediately below respectively (wrapping around to the top side of the column if a letter in the original pair was on the bottom side of the column). 4. If both alphabets are not on the same row or column, replace them with the letters on the same row respectively but at the other pair of corners of the rectangle defined by the original pair. The order is important the first letter of the encrypted pair is the one that lies on the same row as the first letter of the PT pair. The decryption process, use the INVERSE (opposite) of the last 3 (2,3,4) rules, and the 1st as-is (dropping any extra "X"s (or "Q"s) that do not make sense in the final message when finished) [2] Limitations of 5 5 Matrix 1. The 5 5 Matrix considers the letters I and J as one character. 2. Only 26 letters alone can take as key without duplicates. 3. The Space between two words in the PT is not considered as one character. 4. The special characters cannot use as and numbers. 5. The uppercase alphabets are only used in 5x5 Matrix. 6. An extra letter X is added when the PT word consists of odd number of characters. In the DP this X is ignored. X is a valid character and creates confusion because it could be a part of PT, so we cannot simply remove X in DP. 7. X is used a filler letter while repeating letter falls in the same pair are separated. 2. PROPOSED WORK The proposed work consists of the following two steps: construct a modified table of Playfair cipher technique of size 12X8, which contain all the alphabets from A to Z upper case and a to z in lower case, all the special characters which are on the keyboard and all numeric values (from 0 to 9). Construct second matrix of same size 12X8 with ASCII code 8 values from 128 to 223. The PF encryption technique is dividing into two phases: a) First phase is creation and population of first Matrix (by using the key and rotate the matrix with rotation factor after insert the key without duplicate). Check the position of the character in pair of two characters in the first matrix. b) The second phase is encryption process of the plain text message with the help of the Matrix. Make the Cipher text (CT1) of the plain text. Playfair Cipher Phase -1:Creation matrix with the help of Playfair key and population of matrix after inserting key and rotate the matrix with rotation factor. Phase-2:Encryption Process Fig. 2.1 Playfair cipher encryption steps [4] Page 2 of 10
3 At the Receiver ends. Step 2: Construct second matrix of same size 12X8 with ASCII code 8 values from 128 to 223. Take the CT in pair of two characters and check its positions in the second matrix. Step 4: construct a modified table of Playfair cipher technique of size 12X8, which contain all the alphabets form A to Z upper case and a to z in lower case, all the special characters which are on the keyboard and all numeric values (from 0 to 9). The PF decryption technique is divided into two phases: c) First phase is creation and population of Matrix (by using the key). d) The second phase is decryption process of the cipher text (CT1) by the position in the second matrix with the help of the first matrix and makes the plain text. Playfair Cipher Phase -1:Creation matrix with the help of Playfair key and population of matrix after inserting key and rotate the matrix with rotation factor. Phase-2:Decryption Process Fig. 2.2 Playfair cipher decryption steps[4] 1. In the second step, use the key as a PT in RSA algorithm to make the PT of the key and send to the receiver. At the receiver end decrypt the PT into PT (key). By this key make the PF Matrix and decrypt the message. 3. ALGORITHM At the sender ends. Step 1: In the first phase: 1. If in plaintext if there is odd number of character then add the Null character in the last of the key. i. Use two PF matrix size of ii. In First matrix we insert the key without duplicate and fill up the key in the PF matrix without any duplicate from left side to right side and from top to bottom of the PF matrix side, then fill the remaining cells with the upper given tables. iii. In second matrix we use the ASCII code from 128 to If both alphabets appear on the same row in PF matrix table, replace them with the letters which is their immediate in right side respectively (if a letter in the original PT pair was on the right side of the row of PF matrix than wrapping around to the left side of the row) [29]. 3. If both alphabets appear on the same column in PF matrix table, replace them with the letters which is their immediately below side respectively (if a letter in the original PT pair was on the bottom side of the column of PF matrix then wrapping around to the top side of column of the PF matrix) [29]. 4. If both alphabets of PT are not on the same row or column of the PF matrix, replace them with the letters on the same row respectively but at the other pair of the corners of the rectangle in PF matrix defined by the original pair. The order is important the encrypted first letter of the pair of PT is the one that lies on the same row of the PF matrix as the first letter of the PT pair [5]. By this make the cipher text (CT) of the plain text. Send this CT at the receiver end. At the receiver ends. 1. Apply deception process on CT using matrix 2 to get the position of the character and save these position. 2. Construct the Matrix 1 at the receiver end; first insert the key without duplicate and after this insert the remaining characters in upper given tables. 3. According the position of the CT characters (in pair of 2 characters until end of cipher text) decrypt it using matrix 1 and get the original plain text. 4. Decrypt the CT to get the original PT by the extended PF Matrix. Page 3 of 10
4 4) FLOW CHART Start End Input key for the playfair matrix, input plain text PT1 If key length of playfair is Make the playfair matrix of size 12X8 of ASCII 7 code and rotate it with rotation Input plain text, take first two char as a pair and so on untill end of plain. Check position of these characters in first Add null in last of Fig. 4.1 Flow Chart of Algorithm 5. Experiment Analysis The proposed work is dividing in two phases: The first phase for Matrix construction uses all the rules of traditional Play fair matrix with these changes: The two I and J letters in upper case and lower case are considered as two different letters (I and J are different and i and j are different). It allows more than 26 (up to 96 characters without any duplicate) characters as key. It is case sensitive; it uses the upper case as well as lower case characters. Combinations of numbers efficiently can easily encrypted and decrypted efficiently by user. Combination of operators, brackets, special characters, can easily encrypted and decrypted efficiently by user. This algorithm adds the Null character to complete the pair, because the Null character can t affect the PT at the end of the word or sentence. Space between two words in PT considered as one character. In second matrix, we use the ASCII code from value 128 to 223 Save these positions Take second matrix check these positions in second matrix and make cipher text (CT) and send to. At receiver end check CT from matrix 2 save their positions make first matrix with the key and rotate the matrix with rotation factor, then decrypt CT. Page 4 of 10
5 TABLE 5.1 LIST OF UPPER CASE LETTERS, LOWER CASE LETTER, NUMERIC VALUES, OPERATORS, BRACKETS AND SPECIAL. CHARACTERS Table 5.3 Char form of the table Table 5.2 ASCII code use in second table. The key length is very large in comparison with the previous algorithms, here, so it is very difficult to find the plain text from CT without knowing a key. This algorithm can t separate a repeating PT letters with a filter letter. Page 5 of 10
6 EXAMPLE AND SNAPSHOT 6.1 Example Table 6.2 of plain text i am ram Table 6.1 second matrix for all example Inputs in examples Key=playfairexample and plain text is= i am ram for all examples After remove duplicate =playfirexm Example 1 with rotation 0 TABLE 4.5 First 12 8 playfair matrix at sender end and receiver end for example 1, rotation 0 Fig 6.1. output of example 1 with rotation Example 1 with rotation 1 TABLE 6.3 First 12 8 playfair matrix at sender end and receiver end for example 1, rotation 1 Plain text= i am ram Page 6 of 10
7 TABLE 6.5 First 12 8 playfair matrix at end and the receiver end for example 1, rotation 3 Fig. 6.2 output of example 1 with rotation Example 1 with rotation 2 TABLE 6.4 First 12 8 playfair matrix at sender end and receiver end for example 1, rotation 2 Fig. 6.5 output of example 1 with rotation 3 Fig. 6.3 output of example 1 with rotation Example 1 with rotation Example 1 with rotation 4 Page 7 of 10
8 TABLE 4.7 First 12 8 playfair matrix at sender and receiver end for example 1, rotation 4 TABLE 4.11 First 12 8 playfair matrix at sender and receiver end for example 1, rotation 5 Fig. 6.7 output of example 1 with rotation Example 1 with rotation 6 TABLE 6.12 First 12 8 playfair matrix at sender and receiver end for example 1, rotation 6 Fig. 6.6 output of example 1 with rotation Example 1 with rotation 5 Page 8 of 10
9 Fig.6.9 output of example 1 with rotation Example 1 with rotation 7 TABLE 6.10 First 12 8 playfair matrix at sender and receiver end for example 1, rotation 7 Fig output of example 1 with rotation 7 6. CONCLUSION So far the encryption technique adopting concept of PLAY-FAIR CIPHER MATRIX of size 5X5 has been programmed for calculating the Cipher Text. Finally, we have pointed the merits and demerits of traditional PF algorithm. In order to overcome demerits, we have proposed an extension to traditional PF cipher algorithm; which can be used more efficiently even for the Plain Text containing alphanumeric values and special characters and use the rotation factor for the high avalanche effect. Complete mathematical derivation is given to show the exact result at both sender and receiver sides the previous encryption technique is also a part of this system. After completion of program the strength of the technique has been checked and this encryption technique can also be used for other networks. In this algorithm playfair matrix is used for creating the cipher text. Page 9 of 10
10 REFERENCES [1] Fauzan Saeed and Mustafa Rashid, Integrating Classical Encryption with Modern Technique, IJCSNS International Journal of Computer 280 Science and Network Security, Vol.10, No.5, May 2010, Page [2] Ravindra babu, Udaya Kumar, Vinaya babu, An Extension to Traditional Play Fair Cipher Cryptographic Substitution Method, IJCA, , Vol. 17, No 5, March [3] A. Aftab Alam, B. Shah Khalid, and C. Muhammad Salam, A Modified Version of Playfair Cipher Using 7 4 Matrix. International Journal of Computer Theory and Engineering, Vol. 5, No. 4, August [4] Atul Kahate, Cryptography and Network Security, 2 nd edition, McGraw-Hill, [5] Cryptography, Cryptography portal, [6] V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani, A Modified Playfair Cipher Involving Interweaving and Iteration, International Journal of Computer Theory and Engineering, Vol. 1, No. 5, December, [7] Lt. Ravindra Babu Kallam, Dr. S. Udaya Kumar, Dr. A.Vinaya Babu3 and Dr. M. Thirupathi Reddy, A Block Cipher Generation Using Color Substitution, 2010 International Journal of Computer Applications ( ) Volume 1 No. 28 [8] Mona Sabry, Mohamed Hashem, Taymoor Nazmy, Mohamed Essam Khalifa, A DNA and Amino Acids-Based Implementation of Playfair Cipher, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 3, 2010 [9] Subhajit Bhattacharyya, Nisarga Chand & Subham Chakraborty, A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps International Journal of Advanced Research in Computer Engineering & Technology Volume 3, Issue 2, February 2014 [10] Sriram Ramanujam and Marimuthu Karuppiaj, Designing an algorithm with High Avalanche Effect, IJCSNS International Journal of Computer Science and Network Security, Vol. 11, No. 1, January 2011, Page [11] Shiv Shakti Srivastava, Nitin Gupta, A Novel Approach to Security using Extended Playfair Cipher, International Journal of Computer Applications ( ) Volume 20 No.6, April 2011 [12] Harinandan Tunga, Soumen Mukherjee, A New Modified Playfair Algorithm Based On Frequency Analysis, International Journal of Emerging Technology and Advanced Engineering, ISSN , Volume 2, Issue 1, January [13] Monika Arora, Anish Sandiliya, and Jawad Ahmad Dar, Modified Encryption Technique by Triple Substitution on Playfair Square Cipher Using 6 By 6 Matrix with Five Iteration Steps International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: X, Volume 5, Issue 4, [14] S.S.Dhenakaran, and M. Ilayaraja, Extension of Playfair Cipher using 16X16 Matrix, International Journal of Computer Applications ( ) Volume 48 No.7, June [15] Sanjay Basu, and Utpal Kumar Ray, Modified Playfair Cipher using Rectangular Matrix, International Journal of Computer Applications ( ) Volume 46 No.9, May [16] Sagar Gurnani, Nitish Mhalgi, Samyukta Iyer, and Deepika Dixit, Modified 3-D Playfair Stream Cipher, International Journal of Computer Applications ( ) Volume 84 No 15, December [17] Ali Mir Arif Mir Asif, and Shaikh Abdul Hannan, A Review on Classical and Modern Encryption Techniques, International Journal of Engineering Trends and Technology (IJETT) Volume 12 Number 4 - Jun [18] Surendra Singh Chauhan, Hawa Singh, and Ram Niwas Gurjar Secure Key Exchange using RSA in Extended Playfair Cipher Technique, International Journal of Computer Applications ( ) Page 10 of 10
Keywords: Playfair, Matrix, XOR operation
Modified Playfair Cipher for Encrypting Images Faisal Mohammed Abdalla 1, Khadiga Mohammed Adam Babiker 2 1 Collage of computer science and information technology, Karary University, Omdurman, Sudan 2
More informationA Modified Playfair Encryption Using Fibonacci Numbers
A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability
More informationAn Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion
Volume 117 No. 20 2017, 325-330 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Adaptive Play fair Cipher Algorithm for Secure Communication Using
More informationImplementation of Modified Playfair CBC Algorithm
Implementation of Modified Playfair CBC Algorithm Priyanka Goyal Dept. of Computer Science & Engineering ITM Group of Institutions Gwalior, India Gaurav Sharma Dept. of Computer Science & Engineering ITM
More informationAn Efficient Binary Playfair Algorithm Using a 4 4 Playfair Key Matrix
An Efficient Binary Playfair Algorithm Using a 4 4 Playfair Key Matrix Saswati Mukherjee, Matangini Chattopadhyay, Ayan Lahiri, Samiran Chattopadhyay To cite this version: Saswati Mukherjee, Matangini
More informationEnhanced 3-D PLAYFAIR Cipher
Enhanced 3-D PLAYFAIR Cipher Anju Bala Research Scholar, DCSA, M.D.U. Rohtak, Haryana (India) anjudeswal.mdu@gmail.com Publishing Date: June 10, 2017 Abstract Cryptography is where security engineering
More informationSankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List
1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the
More informationA Novel Paradigm for Symmetric Cryptosystem
A Novel Paradigm for Symmetric Cryptosystem Shadi R. Masadeh Faculty of Information Technology Isra University Amman, Jordan Hamza A. Al_Sewadi King Hussein Faculty of Computing Prince Sumaya University
More informationProposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect
Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect 1 Aumreesh Saxena, 2 Sourabh Singh 1 Sagar Institute of Research Technology and Science, Bhopal, Madhya Pradesh
More informationModified Playfair Cipher Using Random Key Linear Congruent Method
4 th INTERNATIONAL SEMINAR: RESEARCH FOR SCIENCE, TECHNOLOGY AND CULTURE (IRSTC 2017) Modified Playfair Cipher Using Random Key Linear Congruent Method Muhammad Syahrizal 1 *, Murdani 2, Surya Darma Nasution
More informationA.Vinaya Babu Principal, JNTUCE J.N.T.U.H, Hyderabad A.P, India. Ravindra Babu Kallam Research Scholar, J.N.T.U, Hyderabad A.
An Impregnable Block Cipher Generation using Modern Transposition and Substitution Algorithms with a large Key, Modular Arithmetic and Integral Functions Ravindra Babu Kallam Research Scholar, J.N.T.U,
More informationProposing A Symmetric Key Bit-Level Block Cipher
Proposing A Symmetric Key Bit-Level Block Cipher Sarbajit Manna, Saurabh Dutta Abstract A novel bit level block cipher based symmetric key cryptographic technique using G.C.D is proposed in this research
More information3D (6 X 4 X 4) - Playfair Cipher
3D (6 X 4 X 4) - Playfair Cipher Nitin 1, Shubha Jain 2 1,2 Department of Computer Science & Engineering, Kanpur Institute of Technology, Kanpur, India Abstract: The role of Cryptography in today s digital
More informationSurvey: Recent Modifications in Vigenere Cipher
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 49-53 Survey: Recent Modifications in Vigenere Cipher Ranju S Kartha
More informationScience & Technology (DCRUST), Sonepat
A Hybrid Approach for Data Encryption and Hema Arora 1, Anil Arora 2 1 Department of Computer ScienceGateway Institute of Engineering & Technology (GIET), Deenbandhu Chhotu Ram University of Science &
More informationOverview of Conventional Encryption Techniques
Overview of Conventional Encryption Techniques Shadab Pasha CDGI,Indore shadabpasha@gmail.com Abstract: Symmetric Encryption or Single-key Encryption or Conventional Encryption was only the type of encryption
More informationFile text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm
Journal of Physics: Conference Series PAPER OPEN ACCESS File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm To cite this article: Amalia et
More informationA Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data
International Journal of Electrical and Computer Engineering (IJECE) Vol. 4, No. 1, Feburary 2014, pp. 93~100 ISSN: 2088-8708 93 A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving
More informationEnhanced Play Fair Cipher
P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and
More informationA Proposed Cipher Technique with a Study of Existing Cryptography Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationA New variant of Hill Cipher Algorithm for Data Security
Volume 117 No. 15 2017, 581-588 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A New variant of Hill Cipher Algorithm for Data Security Kalaichelvi
More informationA Modified Playfair Cipher for a Large Block of Plaintext
International Journal of Computer Theory and Engineering, Vol 1, No 5, Decemer, 2009 A Modified layfair Cipher for a Large Block of laintext V Umakanta Sastry, N Ravi Shankar, and S Durga Bhavani Astract
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationA Block Cipher Involving a Key Matrix and a Key bunch Matrix, Supplemented with Mix
Research Inventy: International Journal Of Engineering And Science Vol., Issue 9 (April 3), Pp - Issn(e): 7-47, Issn(p):-643, Www.Researchinventy.Com A Block Cipher Involving a Key Matrix a Key bunch Matrix,
More informationA Block Cipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix
Journal of omputer Science 4 (): 7-4, 8 ISSN 549-3636 8 Science Publications A Block ipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix
More informationDesign and Analysis of New Symmetric Block Cipher Algorithm
Design and Analysis of New Symmetric Block Cipher Algorithm KALAICHELVI V && MANIMOZHI K Asst. Professor, SRC- SASTRA University, Kumbakonam, India E-mail: kalaichelvi2k@yahoo.com Abstract Cryptography
More informationWebpage: Volume 5, Issue VII, July 2017 ISSN
Image Security using Non-Linear Data Structure Dr. S. Kiran 1, R. Pradeep Kumar Reddy 2, V. Siva Kumar 3, P. Veereshkumar Goud 4 1,2 Assistant Professor, 3,4 Student 1,2,3,,4 Dept. of CSE, YSR Engineering
More informationMulti-Level Encryption using SDES Key Generation Technique with Genetic Algorithm
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7596-7576 Multi-Level Encryption using SDES Key Generation Technique with
More information10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings 1 Chapter 2 Classical Encryption Techniques "I am fairly familiar with all the forms of secret writings, and am myself the author of
More informationClassical Encryption Techniques. CSS 322 Security and Cryptography
Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time
More informationCRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext
CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public
More informationA Proposed Method for Cryptography using Random Key and Rotation of Text
Volume 6, No.2, March - April 2017 Mousumi Ghanti et al., International Journal of Advanced Trends in Computer Science and Engineering, 6(2), March - April 2017, 18-22 Available Online at http://www.warse.org/ijatcse/static/pdf/file/ijatcse03622017.pdf
More informationVigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process
IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process To cite this article: A Subandi
More informationChapter 2: Classical Encryption Techniques
CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 2: Classical Encryption Techniques Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Introduction Basic
More informationInternational Journal of Computer Engineering and Applications, ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD
International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, www.ijcea.com ISSN 2321-3469 ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD Namrata
More informationA Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix
IAENG International Journal of Computer Science, 32:4, IJCS_32_4_ A Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix S. Udaya Kumar V. U. K.
More informationA NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS
IJRET: International Journal of Research in Engineering and Technology eissn: 2319-1163 pissn: 2321-738 A NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS Kalavathi Alla 1, Sai Jyothi B 1,2
More informationCryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái
Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There
More informationENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM Thangarasu.N Research Scholar in Department of Computer Science Bharathiar University,Coimbatore Dr.Arul Lawrence SelvaKumar Dean & Professor, Department of
More informationHybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm
ISSN : 0974 5572 International Science Press Volume 9 Number 40 2016 Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm D. Anitha a S. Aruna a Mathew a K. Mathew a and Devilal
More informationDiversified Caesar Cipher for Impeccable Security
Vol.11, No.3 (2017), pp.33-40 http://dx.doi.org/10.14257/ijsia.2017.11.2.04 Diversified Caesar Cipher for Impeccable Security 1 Priya Verma, 2 Gurjot Singh Gaba, 3 Rajan Miglani * 1,2,3 Discipline of Electronics
More informationA Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security
A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security Manas Paul 1 and Jyotsna Kumar Mandal 2 1 Dept. of Comp. Application, JIS College of Engineering,
More informationName of chapter & details.
Course Title Course Code Information Security IT707 Theory : 03 Course Credit Practical : 01 Tutorial : 00 Course Learning Outcomes Credits : 04 On the completion of the course, students will be able to:
More informationHardware Design and Software Simulation for Four Classical Cryptosystems
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 21 (2013 ) 500 505 The 4 th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013)
More informationPART THREE. PoIygraphlc Substitution Systems CHARACTERISTICS OF POLYGRAPHIC SUBSTITUTION SYSTEMS
PART THREE PoIygraphlc Substitution Systems CHARACTERISTICS OF POLYGRAPHIC SUBSTITUTION SYSTEMS CHAPTER 6 Section I Characteristics of Polygraphic Encipherment 6-1. Types of Polygraphic Systems As first
More informationCSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology
CSEC 507: APPLIED CRYPTOLOGY Middle East Technical University Ankara, Turkey Last Modified: December 9, 2015 Created: August 5, 2015 What is Cryptology, Cryptography, and Cryptanalysis? (A Short) Definition
More informationCombination of RGB Substitution for Text to Image Encryption Technique using AES
Combination of RGB Substitution for Text to Image Encryption Technique using AES Sourabh Singh 1 Department of Computer Science and Engineering Radharaman Institute of Technology and Science Bhopal (M.P),
More informationHill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and Key
International Journal of Computer Networks and Security, ISSN:25-6878, Vol.23, Issue.2 7 Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and
More informationRashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,
SMS Encryption Rashmi P. Sarode *, Neeraj Manglani Department of Computer Science Jagan Nath University, Jaipur, India Abstract In the application of Computer Science, the performance of classification
More informationDr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India
Vol., No., A Block Cipher Involving a Key Bunch Matrix an Additional Key Matrix, Supplemented with Modular Arithmetic Addition supported by Key-based Substitution Dr. V.U.K.Sastry Professor (CSE Dept),
More informationK Anup Kumar et al,int.j.comp.tech.appl,vol 3 (1), 32-39
A Modified Feistel Cipher Involving a Key as a Multiplicant on Both the Sides of the Plaintext Matrix and Supplemented with Mixing, Permutation, and Modular Arithmetic Addition 1 V.U.K. Sastry, 2 K. Anup
More informationBlock Ciphers and Data Encryption Standard. CSS Security and Cryptography
Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322
More informationPART I Symmetric Ciphers
PART I Symmetric Ciphers CHAPTER 2 Classical Encryption Techniques Cryptography, Cryptanalysis Caesar cipher, Monoalphabetic ciphers Playfair cipher, Hill cipher Polyalphabetic ciphers One-time Pad 2.3
More informationISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationASCII BASED ENCRYPTION DECRYPTION TECHNIQUE FOR INFORMATION SECURITY AND COMMUNICATION
ASCII BASED ENCRYPTION DECRYPTION TECHNIQUE FOR INFORMATION SECURITY AND COMMUNICATION Er. Suraj Arya 1, Dr.Ankit Kumar 2 1 Research Scholar,Baba Mastnath University, Rohtak, Haryana,(INDIA) 2 Assistant
More informationAN EFFECTIVE PERFORMANCE EVALUATION OF RC6, BLOWFISH, DES ALGORITHMS
Volume 2, Issue 7, PP:, SEPTEMBER 2014. AN EFFECTIVE PERFORMANCE EVALUATION OF RC6, BLOWFISH, DES ALGORITHMS P. Sagar Babu 1*, Prof.Ch.Srinivasa Kumar 2* 1. II. M.Tech (VLSI), Dept of ECE, AM Reddy Memorial
More informationCSCE 715: Network Systems Security
CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina 01/20/2015 2 Cryptography Study of schemes used for encryption Can be characterized by type of encryption
More informationProposal for Scrambled Method based on NTRU
Proposal for Scrambled Method based on NTRU Ahmed Tariq Sadiq Computer Science Department University of Technology Baghdad, Iraq Najlaa Mohammad Hussein Computer Science Department Baghdad University Baghdad,
More informationC = E(p) = (p + k) mod (n) p = D(C) = (C k) mod (n)
Substitutions ciphers (monoalphabetic) A substitution technique is one in which the characters of plaintext are replaced by other characters or by numbers or symbols. If the plaintext is viewed as a sequence
More informationTraditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur
Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel
More informationC.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan
Enhancing DES Using Local Languages C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Abstract: Network services and internet plays vital role in transmitting information from source to destination.
More informationENHANCED AES ALGORITHM FOR STRONG ENCRYPTION
ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION V. Sumathy & C. Navaneethan Assistant Professor, Department of CSE, Kingston Engineering College, Vellore, Tamil Nadu, India ABSTRACT In this paper we present
More informationEnhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication
Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication K.Arul Jothy, Final Year, Department of Computer Science and Engineering, JCT College
More informationAn implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android
Journal of Physics: Conference Series PAPER OPEN ACCESS An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android To cite this article: M A Budiman et
More informationBlock Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition
Journal of Computer Science 6 (2): 133-140, 2010 ISSN 1549-3636 2010 Science Publications Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition K. Anup Kumar and V.U.K.
More informationCombining TCP and UDP for Secure Data Transfer
ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 8(S9), 285 291, May 2015 DOI: 10.17485/ijst/2015/v8iS9/65569 Combining TCP and UDP for Secure Data Transfer
More informationInternational Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY
Scientific Journal of Impact Factor (SJIF): 3134 ISSN (Print): 2348-6406 ISSN (Online): 2348-4470 International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS
More informationEvolution of Sha-176 Algorithm
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 2, Issue 2 (July-Aug. 2012), PP 18-22 Evolution of Sha-176 Algorithm Piyush Garg 1, Namita Tiwari 2 1,2 (Computer Science and Engineering,
More informationSecure Encryption Using Armstrong Number,Color Code ASCII and Prime Number
Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 6 (2017), pp. 1257-1265 Research India Publications http://www.ripublication.com Secure Encryption Using Armstrong Number,Color
More informationInternational Journal of Advance Research in Engineering, Science & Technology
Impact Factor (SJIF): 4.542 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 4, Issue 4, April-2017 Asymmetric Key Based Encryption
More informationExploring Cryptography Using CrypTool
NEMATYC 2018 Exploring Cryptography Using CrypTool Valeria D Orazio Massachusetts Maritime Academy Importance of Cryptography 1998 Project start Originated as an internal business application for information
More informationCryptography Functions
Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)
More informationChapter 3 Traditional Symmetric-Key Ciphers 3.1
Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric
More informationBlock Encryption and DES
Block Encryption and DES Plain Text Block 1 Block 2 Block 3 Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available
More informationClassical Encryption Techniques
Classical Encryption Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationCryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL
Cryptography and Network Security Lecture 02 Symmetric Encryption Ediz ŞAYKOL Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption
More informationCryptography. What is Cryptography?
Cryptography What is Cryptography? Cryptography is the discipline of encoding and decoding messages. It has been employed in various forms for thousands of years, and, whether or not you know it, is used
More informationBYTE ROTATION WITH CBC ENCRYPTION ALGORITHM
BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM MAHENDRAN R Assistant professor, Dept of computer science, Puthanampatti ABSTRACT In this modern electronic age we need to protect sensitive and valuable information
More informationMODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT) Rajdeep Chakraborty* 1, Avishek Datta 2, J.K. Mandal 3
ISSN 2277-2685 IJESR/Feb 2015/ Vol-5/Issue-2/76-81 Rajdeep Chakraborty et. al./ International Journal of Engineering & Science Research MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT)
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.2 Secret Key Cryptography CSC 474/574 Dr. Peng Ning 1 Agenda Generic block cipher Feistel cipher DES Modes of block ciphers Multiple encryptions Message
More informationIN ORMATION THEORY TESTS BASED PER ORMANCE EVALUATION O CRYPTOGRAPHIC TECHNIQUES
International Journal of Information Technology and Knowledge Management July-December 2008, Volume 1, No. 2, pp. 475-483 IN ORMATION THEORY TESTS BASED PER ORMANCE EVALUATION O CRYPTOGRAPHIC TECHNIQUES
More informationFPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E
FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E Amandeep Singh, Manu Bansal Abstract - Data Security is an important parameter for the industries. It can be achieved by Encryption
More informationVertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem
Vol 1, Issue 2, April 2013 Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Krishnappa H K 1, N K Srinath 2 and S Manjunath 3 Assistant Professor, Dept of
More informationLight Weight Cellular Automata Computations and Symmetric Key for Achieving Efficient Cryptography
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 12, December 2015, PP 84-91 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Light Weight Cellular Automata Computations
More informationComputational Security, Stream and Block Cipher Functions
Computational Security, Stream and Block Cipher Functions 18 March 2019 Lecture 3 Most Slides Credits: Steve Zdancewic (UPenn) 18 March 2019 SE 425: Communication and Information Security 1 Topics for
More informationReversible Data Hiding in Encrypted Images with Private Key Cryptography
Reversible Data Hiding in Encrypted Images with Private Key Cryptography Wajahath Hussain Razvi, Dr.Ch.Samson Abstract This project proposes a reversible scheme for cipher images which are encrypted using
More informationANALYSIS OF AES ENCRYPTION WITH ECC
ANALYSIS OF AES ENCRYPTION WITH ECC Samiksha Sharma Department of Computer Science & Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India Vinay Chopra Department of Computer
More informationApplication of Two-dimensional Periodic Cellular Automata in Image Processing
International Journal of Computer, Mathematical Sciences and Applications Serials Publications Vol. 5, No. 1-2, January-June 2011, pp. 49 55 ISSN: 0973-6786 Application of Two-dimensional Periodic Cellular
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationEnsuring information security through 123-bit recursive substitution of bits through prime-nonprime detection of sub-stream (RSBP)
Journal of Scientific & Industrial Research 584 Vol. 68, July 2009, pp. 584-591 J SCI IND RES VOL 68 JULY 2009 Ensuring information security through 123-bit recursive substitution of bits through prime-nonprime
More informationA Survey On SecureImage Encryption Technique Using Blowfish And Chaos
A Survey On SecureImage Encryption Technique Using Blowfish And Chaos Romani Patel 1,Krunal Panchal 2 1 Research Scholar, Information Technology, L.J Institute Of Engineering And Technology, Ahmedabad,
More information6. Symmetric Block Cipher BLOWFISH Performance. Memory space. 3. Simplicity The length of the key. The length of the data block is 64.
belongs to the same class of conventional symmetric ciphers. The basic principles of have been published in 1994 by Bruce Schneier, as an alternative to the Data encryption standard (DES) to satisfy the
More informationVariable Key : A new investigation in cryptography and results thereoff
Variable Key A new investigation in cryptography and results thereoff P. Chakrabarti 1, LMISTE C.T.Bhunia 2, B. Bhuyan 3 1 Bengal Institute of Technology and Management, Santiniketan, West Bengal, Pin-731236,India
More informationAn Efficient FPGA Implementation of the Advanced Encryption Standard (AES) Algorithm Using S-Box
Volume 5 Issue 2 June 2017 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org An Efficient FPGA Implementation of the Advanced Encryption
More informationCryptography and Network Security. Saint Leo University. COM 450- Network Defense and Security. Instructor: Dr. Omar.
Saint Leo University COM 450- Network Defense and Security Instructor: Dr. Omar Group members: Ivanna, Tracey, Romario, Chevon March 13, 2018 Abstract This paper will look at different aspects of Cryptography,
More informationAnalysis of Cryptography and Pseudorandom Numbers
ISSN: 2454-2377 Volume 2, Issue 2, June 2016 Analysis of Cryptography and Pseudorandom Numbers Richa Agarwal Student, M. Tech., Computer Science, Invertis University, Bareilly, India Abstract: With the
More informationHardware Implementation of Cryptosystem by AES Algorithm Using FPGA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationInternational Journal of Mathematics Trends and Technology- Volume29 Number2 January 2016
International Journal of Mathematics Trends and Technology Volume Number January Symmetric Key Cryptosystem for Multiple Encryptions A. ChandraSekhar*,, D. Chaya Kumari #, S. Ashok Kumar * * Department
More informationA SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS
Volume 116 No. 6 2017, 149-153 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET
More informationPerformance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect
244 Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect Krishnamurthy G.N, Dr. V. Ramaswamy, Leela G.H and Ashalatha
More information