Enhance Security of Playfair Matrix Using Two 12X8 Playfair Matrix

Size: px
Start display at page:

Download "Enhance Security of Playfair Matrix Using Two 12X8 Playfair Matrix"

Transcription

1 Enhance Security of Playfair Matrix Using Two 12X8 Playfair Matrix Pavan Kumar*, Vedant Rastogi** Department of Computer Science & Engineering IET, Alwar - ABSTRACT In the last some decades in digital world, communication of information is very hazardous in the charisma of the third party on internet. There cryptography is used to safe and sound information in order to offer the solitude for the planned sender as well as receiver by managing the message with the Symmetric and Asymmetric key cryptography. The purpose of this work is to securing the message (cipher text) of playfair technique of size12x8 using second matrix of same size of 12X8. It s in two-part algorithm. In I st stage existing playfair cipher customized by mounting in size of matrix, so that restrictions of former works of playfair (PF) cipher using 5 5 matrix were conquer in proposed work. In this proposed scheme, use a 12 8 matrix that contains many alphabetic, numeric and special character use as input. This work is an step up to existing algorithms that uses 5 5 matrix to pick cipher characters. It makes use of alphabets both type lower case as well as upper case characters, number as well as special characters on behalf of constructing the contents of the matrix and after this we use the rotation factor to turn around the matrix. In II nd stage, we check the position of plain text in second matrix and make cipher text by it. This cipher text is sent to receiver end, at receiver end receiver check the position of this cipher text in second matrix and saves theses position and gets the plain text by seeing these positions in this first matrix. By these matrixes we can decrypt this cipher text and get plain text finally, security strength of whole system has been analyzed and tried to fulfill necessity of security. At the last, dissertation presents the scope for further work and concludes the dissertation. Keywords: Playfair=PF, Plaintext=PT, Plaintext1=PT1, Plaintext2=PT2, Cipher text= CT, Cipher text1= CT1, Cipher text2= CT2, Encryption Technique=ET, Decryption Technique=DT 1. INTRODUCTION 1.1 Introduction about PlayfairTechnique The basic Playfair cipher uses a matrix of 5 5 containing a key or phrase. Memorization of the key is achieved by generating a 5 5 key table and cipher text is created by applying four simple rules on this key table [1]. To generate the key table, one would first fill in the spaces in the table with the letters of the key (dropping any duplicate letters), then fill the remaining spaces with the rest of the letters of the alphabet in order (usually omitting "Q" to reduce the alphabet to fit; other versions put both "I" and "J" in the same space) [1]. The key can be written in the top rows of the table, from left to right, or in some other pattern, such as a spiral beginning in the upper-lefthand corner and ending in the center. The key together with the conventions for filling in the 5 5 table constitute the cipher key [1]. To encrypt a message, one would break the message into digraphs (groups of 2 letters) for example; "HELLO WORLD" becomes "HE, LL, OW, OR, LD", and maps them out on the key table. If needed, append a "Z" to complete the final digraph. The two letters of the digraph are considered as the opposite corners of a rectangle in the key table [2]. Note the relative position of the corners of this rectangle. Then apply the following 4 rules, in Page 1 of 10

2 order, to get encrypted message for each pair of letters in the PT [1] Rules for making CT using PF Matrix 1. Add an "X" after the first letter, if both letters are the same (or only one letter is left). Encrypt the new pair and continue doing this. Some variants of PF use "Q" instead of "X", but any uncommon monograph will do. 2. If both alphabets appear on the same row in table, replace them with the letters to their immediate right respectively (wrapping around to the left side of the row if a letter in the original pair was on the right side of the row). 3. If both alphabets appear on the same column in table, replace them with the letters immediately below respectively (wrapping around to the top side of the column if a letter in the original pair was on the bottom side of the column). 4. If both alphabets are not on the same row or column, replace them with the letters on the same row respectively but at the other pair of corners of the rectangle defined by the original pair. The order is important the first letter of the encrypted pair is the one that lies on the same row as the first letter of the PT pair. The decryption process, use the INVERSE (opposite) of the last 3 (2,3,4) rules, and the 1st as-is (dropping any extra "X"s (or "Q"s) that do not make sense in the final message when finished) [2] Limitations of 5 5 Matrix 1. The 5 5 Matrix considers the letters I and J as one character. 2. Only 26 letters alone can take as key without duplicates. 3. The Space between two words in the PT is not considered as one character. 4. The special characters cannot use as and numbers. 5. The uppercase alphabets are only used in 5x5 Matrix. 6. An extra letter X is added when the PT word consists of odd number of characters. In the DP this X is ignored. X is a valid character and creates confusion because it could be a part of PT, so we cannot simply remove X in DP. 7. X is used a filler letter while repeating letter falls in the same pair are separated. 2. PROPOSED WORK The proposed work consists of the following two steps: construct a modified table of Playfair cipher technique of size 12X8, which contain all the alphabets from A to Z upper case and a to z in lower case, all the special characters which are on the keyboard and all numeric values (from 0 to 9). Construct second matrix of same size 12X8 with ASCII code 8 values from 128 to 223. The PF encryption technique is dividing into two phases: a) First phase is creation and population of first Matrix (by using the key and rotate the matrix with rotation factor after insert the key without duplicate). Check the position of the character in pair of two characters in the first matrix. b) The second phase is encryption process of the plain text message with the help of the Matrix. Make the Cipher text (CT1) of the plain text. Playfair Cipher Phase -1:Creation matrix with the help of Playfair key and population of matrix after inserting key and rotate the matrix with rotation factor. Phase-2:Encryption Process Fig. 2.1 Playfair cipher encryption steps [4] Page 2 of 10

3 At the Receiver ends. Step 2: Construct second matrix of same size 12X8 with ASCII code 8 values from 128 to 223. Take the CT in pair of two characters and check its positions in the second matrix. Step 4: construct a modified table of Playfair cipher technique of size 12X8, which contain all the alphabets form A to Z upper case and a to z in lower case, all the special characters which are on the keyboard and all numeric values (from 0 to 9). The PF decryption technique is divided into two phases: c) First phase is creation and population of Matrix (by using the key). d) The second phase is decryption process of the cipher text (CT1) by the position in the second matrix with the help of the first matrix and makes the plain text. Playfair Cipher Phase -1:Creation matrix with the help of Playfair key and population of matrix after inserting key and rotate the matrix with rotation factor. Phase-2:Decryption Process Fig. 2.2 Playfair cipher decryption steps[4] 1. In the second step, use the key as a PT in RSA algorithm to make the PT of the key and send to the receiver. At the receiver end decrypt the PT into PT (key). By this key make the PF Matrix and decrypt the message. 3. ALGORITHM At the sender ends. Step 1: In the first phase: 1. If in plaintext if there is odd number of character then add the Null character in the last of the key. i. Use two PF matrix size of ii. In First matrix we insert the key without duplicate and fill up the key in the PF matrix without any duplicate from left side to right side and from top to bottom of the PF matrix side, then fill the remaining cells with the upper given tables. iii. In second matrix we use the ASCII code from 128 to If both alphabets appear on the same row in PF matrix table, replace them with the letters which is their immediate in right side respectively (if a letter in the original PT pair was on the right side of the row of PF matrix than wrapping around to the left side of the row) [29]. 3. If both alphabets appear on the same column in PF matrix table, replace them with the letters which is their immediately below side respectively (if a letter in the original PT pair was on the bottom side of the column of PF matrix then wrapping around to the top side of column of the PF matrix) [29]. 4. If both alphabets of PT are not on the same row or column of the PF matrix, replace them with the letters on the same row respectively but at the other pair of the corners of the rectangle in PF matrix defined by the original pair. The order is important the encrypted first letter of the pair of PT is the one that lies on the same row of the PF matrix as the first letter of the PT pair [5]. By this make the cipher text (CT) of the plain text. Send this CT at the receiver end. At the receiver ends. 1. Apply deception process on CT using matrix 2 to get the position of the character and save these position. 2. Construct the Matrix 1 at the receiver end; first insert the key without duplicate and after this insert the remaining characters in upper given tables. 3. According the position of the CT characters (in pair of 2 characters until end of cipher text) decrypt it using matrix 1 and get the original plain text. 4. Decrypt the CT to get the original PT by the extended PF Matrix. Page 3 of 10

4 4) FLOW CHART Start End Input key for the playfair matrix, input plain text PT1 If key length of playfair is Make the playfair matrix of size 12X8 of ASCII 7 code and rotate it with rotation Input plain text, take first two char as a pair and so on untill end of plain. Check position of these characters in first Add null in last of Fig. 4.1 Flow Chart of Algorithm 5. Experiment Analysis The proposed work is dividing in two phases: The first phase for Matrix construction uses all the rules of traditional Play fair matrix with these changes: The two I and J letters in upper case and lower case are considered as two different letters (I and J are different and i and j are different). It allows more than 26 (up to 96 characters without any duplicate) characters as key. It is case sensitive; it uses the upper case as well as lower case characters. Combinations of numbers efficiently can easily encrypted and decrypted efficiently by user. Combination of operators, brackets, special characters, can easily encrypted and decrypted efficiently by user. This algorithm adds the Null character to complete the pair, because the Null character can t affect the PT at the end of the word or sentence. Space between two words in PT considered as one character. In second matrix, we use the ASCII code from value 128 to 223 Save these positions Take second matrix check these positions in second matrix and make cipher text (CT) and send to. At receiver end check CT from matrix 2 save their positions make first matrix with the key and rotate the matrix with rotation factor, then decrypt CT. Page 4 of 10

5 TABLE 5.1 LIST OF UPPER CASE LETTERS, LOWER CASE LETTER, NUMERIC VALUES, OPERATORS, BRACKETS AND SPECIAL. CHARACTERS Table 5.3 Char form of the table Table 5.2 ASCII code use in second table. The key length is very large in comparison with the previous algorithms, here, so it is very difficult to find the plain text from CT without knowing a key. This algorithm can t separate a repeating PT letters with a filter letter. Page 5 of 10

6 EXAMPLE AND SNAPSHOT 6.1 Example Table 6.2 of plain text i am ram Table 6.1 second matrix for all example Inputs in examples Key=playfairexample and plain text is= i am ram for all examples After remove duplicate =playfirexm Example 1 with rotation 0 TABLE 4.5 First 12 8 playfair matrix at sender end and receiver end for example 1, rotation 0 Fig 6.1. output of example 1 with rotation Example 1 with rotation 1 TABLE 6.3 First 12 8 playfair matrix at sender end and receiver end for example 1, rotation 1 Plain text= i am ram Page 6 of 10

7 TABLE 6.5 First 12 8 playfair matrix at end and the receiver end for example 1, rotation 3 Fig. 6.2 output of example 1 with rotation Example 1 with rotation 2 TABLE 6.4 First 12 8 playfair matrix at sender end and receiver end for example 1, rotation 2 Fig. 6.5 output of example 1 with rotation 3 Fig. 6.3 output of example 1 with rotation Example 1 with rotation Example 1 with rotation 4 Page 7 of 10

8 TABLE 4.7 First 12 8 playfair matrix at sender and receiver end for example 1, rotation 4 TABLE 4.11 First 12 8 playfair matrix at sender and receiver end for example 1, rotation 5 Fig. 6.7 output of example 1 with rotation Example 1 with rotation 6 TABLE 6.12 First 12 8 playfair matrix at sender and receiver end for example 1, rotation 6 Fig. 6.6 output of example 1 with rotation Example 1 with rotation 5 Page 8 of 10

9 Fig.6.9 output of example 1 with rotation Example 1 with rotation 7 TABLE 6.10 First 12 8 playfair matrix at sender and receiver end for example 1, rotation 7 Fig output of example 1 with rotation 7 6. CONCLUSION So far the encryption technique adopting concept of PLAY-FAIR CIPHER MATRIX of size 5X5 has been programmed for calculating the Cipher Text. Finally, we have pointed the merits and demerits of traditional PF algorithm. In order to overcome demerits, we have proposed an extension to traditional PF cipher algorithm; which can be used more efficiently even for the Plain Text containing alphanumeric values and special characters and use the rotation factor for the high avalanche effect. Complete mathematical derivation is given to show the exact result at both sender and receiver sides the previous encryption technique is also a part of this system. After completion of program the strength of the technique has been checked and this encryption technique can also be used for other networks. In this algorithm playfair matrix is used for creating the cipher text. Page 9 of 10

10 REFERENCES [1] Fauzan Saeed and Mustafa Rashid, Integrating Classical Encryption with Modern Technique, IJCSNS International Journal of Computer 280 Science and Network Security, Vol.10, No.5, May 2010, Page [2] Ravindra babu, Udaya Kumar, Vinaya babu, An Extension to Traditional Play Fair Cipher Cryptographic Substitution Method, IJCA, , Vol. 17, No 5, March [3] A. Aftab Alam, B. Shah Khalid, and C. Muhammad Salam, A Modified Version of Playfair Cipher Using 7 4 Matrix. International Journal of Computer Theory and Engineering, Vol. 5, No. 4, August [4] Atul Kahate, Cryptography and Network Security, 2 nd edition, McGraw-Hill, [5] Cryptography, Cryptography portal, [6] V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani, A Modified Playfair Cipher Involving Interweaving and Iteration, International Journal of Computer Theory and Engineering, Vol. 1, No. 5, December, [7] Lt. Ravindra Babu Kallam, Dr. S. Udaya Kumar, Dr. A.Vinaya Babu3 and Dr. M. Thirupathi Reddy, A Block Cipher Generation Using Color Substitution, 2010 International Journal of Computer Applications ( ) Volume 1 No. 28 [8] Mona Sabry, Mohamed Hashem, Taymoor Nazmy, Mohamed Essam Khalifa, A DNA and Amino Acids-Based Implementation of Playfair Cipher, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 3, 2010 [9] Subhajit Bhattacharyya, Nisarga Chand & Subham Chakraborty, A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps International Journal of Advanced Research in Computer Engineering & Technology Volume 3, Issue 2, February 2014 [10] Sriram Ramanujam and Marimuthu Karuppiaj, Designing an algorithm with High Avalanche Effect, IJCSNS International Journal of Computer Science and Network Security, Vol. 11, No. 1, January 2011, Page [11] Shiv Shakti Srivastava, Nitin Gupta, A Novel Approach to Security using Extended Playfair Cipher, International Journal of Computer Applications ( ) Volume 20 No.6, April 2011 [12] Harinandan Tunga, Soumen Mukherjee, A New Modified Playfair Algorithm Based On Frequency Analysis, International Journal of Emerging Technology and Advanced Engineering, ISSN , Volume 2, Issue 1, January [13] Monika Arora, Anish Sandiliya, and Jawad Ahmad Dar, Modified Encryption Technique by Triple Substitution on Playfair Square Cipher Using 6 By 6 Matrix with Five Iteration Steps International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: X, Volume 5, Issue 4, [14] S.S.Dhenakaran, and M. Ilayaraja, Extension of Playfair Cipher using 16X16 Matrix, International Journal of Computer Applications ( ) Volume 48 No.7, June [15] Sanjay Basu, and Utpal Kumar Ray, Modified Playfair Cipher using Rectangular Matrix, International Journal of Computer Applications ( ) Volume 46 No.9, May [16] Sagar Gurnani, Nitish Mhalgi, Samyukta Iyer, and Deepika Dixit, Modified 3-D Playfair Stream Cipher, International Journal of Computer Applications ( ) Volume 84 No 15, December [17] Ali Mir Arif Mir Asif, and Shaikh Abdul Hannan, A Review on Classical and Modern Encryption Techniques, International Journal of Engineering Trends and Technology (IJETT) Volume 12 Number 4 - Jun [18] Surendra Singh Chauhan, Hawa Singh, and Ram Niwas Gurjar Secure Key Exchange using RSA in Extended Playfair Cipher Technique, International Journal of Computer Applications ( ) Page 10 of 10

Keywords: Playfair, Matrix, XOR operation

Keywords: Playfair, Matrix, XOR operation Modified Playfair Cipher for Encrypting Images Faisal Mohammed Abdalla 1, Khadiga Mohammed Adam Babiker 2 1 Collage of computer science and information technology, Karary University, Omdurman, Sudan 2

More information

A Modified Playfair Encryption Using Fibonacci Numbers

A Modified Playfair Encryption Using Fibonacci Numbers A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability

More information

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion Volume 117 No. 20 2017, 325-330 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Adaptive Play fair Cipher Algorithm for Secure Communication Using

More information

Implementation of Modified Playfair CBC Algorithm

Implementation of Modified Playfair CBC Algorithm Implementation of Modified Playfair CBC Algorithm Priyanka Goyal Dept. of Computer Science & Engineering ITM Group of Institutions Gwalior, India Gaurav Sharma Dept. of Computer Science & Engineering ITM

More information

An Efficient Binary Playfair Algorithm Using a 4 4 Playfair Key Matrix

An Efficient Binary Playfair Algorithm Using a 4 4 Playfair Key Matrix An Efficient Binary Playfair Algorithm Using a 4 4 Playfair Key Matrix Saswati Mukherjee, Matangini Chattopadhyay, Ayan Lahiri, Samiran Chattopadhyay To cite this version: Saswati Mukherjee, Matangini

More information

Enhanced 3-D PLAYFAIR Cipher

Enhanced 3-D PLAYFAIR Cipher Enhanced 3-D PLAYFAIR Cipher Anju Bala Research Scholar, DCSA, M.D.U. Rohtak, Haryana (India) anjudeswal.mdu@gmail.com Publishing Date: June 10, 2017 Abstract Cryptography is where security engineering

More information

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List

Sankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List 1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the

More information

A Novel Paradigm for Symmetric Cryptosystem

A Novel Paradigm for Symmetric Cryptosystem A Novel Paradigm for Symmetric Cryptosystem Shadi R. Masadeh Faculty of Information Technology Isra University Amman, Jordan Hamza A. Al_Sewadi King Hussein Faculty of Computing Prince Sumaya University

More information

Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect

Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect 1 Aumreesh Saxena, 2 Sourabh Singh 1 Sagar Institute of Research Technology and Science, Bhopal, Madhya Pradesh

More information

Modified Playfair Cipher Using Random Key Linear Congruent Method

Modified Playfair Cipher Using Random Key Linear Congruent Method 4 th INTERNATIONAL SEMINAR: RESEARCH FOR SCIENCE, TECHNOLOGY AND CULTURE (IRSTC 2017) Modified Playfair Cipher Using Random Key Linear Congruent Method Muhammad Syahrizal 1 *, Murdani 2, Surya Darma Nasution

More information

A.Vinaya Babu Principal, JNTUCE J.N.T.U.H, Hyderabad A.P, India. Ravindra Babu Kallam Research Scholar, J.N.T.U, Hyderabad A.

A.Vinaya Babu Principal, JNTUCE J.N.T.U.H, Hyderabad A.P, India. Ravindra Babu Kallam Research Scholar, J.N.T.U, Hyderabad A. An Impregnable Block Cipher Generation using Modern Transposition and Substitution Algorithms with a large Key, Modular Arithmetic and Integral Functions Ravindra Babu Kallam Research Scholar, J.N.T.U,

More information

Proposing A Symmetric Key Bit-Level Block Cipher

Proposing A Symmetric Key Bit-Level Block Cipher Proposing A Symmetric Key Bit-Level Block Cipher Sarbajit Manna, Saurabh Dutta Abstract A novel bit level block cipher based symmetric key cryptographic technique using G.C.D is proposed in this research

More information

3D (6 X 4 X 4) - Playfair Cipher

3D (6 X 4 X 4) - Playfair Cipher 3D (6 X 4 X 4) - Playfair Cipher Nitin 1, Shubha Jain 2 1,2 Department of Computer Science & Engineering, Kanpur Institute of Technology, Kanpur, India Abstract: The role of Cryptography in today s digital

More information

Survey: Recent Modifications in Vigenere Cipher

Survey: Recent Modifications in Vigenere Cipher IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 49-53 Survey: Recent Modifications in Vigenere Cipher Ranju S Kartha

More information

Science & Technology (DCRUST), Sonepat

Science & Technology (DCRUST), Sonepat A Hybrid Approach for Data Encryption and Hema Arora 1, Anil Arora 2 1 Department of Computer ScienceGateway Institute of Engineering & Technology (GIET), Deenbandhu Chhotu Ram University of Science &

More information

Overview of Conventional Encryption Techniques

Overview of Conventional Encryption Techniques Overview of Conventional Encryption Techniques Shadab Pasha CDGI,Indore shadabpasha@gmail.com Abstract: Symmetric Encryption or Single-key Encryption or Conventional Encryption was only the type of encryption

More information

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm

File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm Journal of Physics: Conference Series PAPER OPEN ACCESS File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm To cite this article: Amalia et

More information

A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data

A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data International Journal of Electrical and Computer Engineering (IJECE) Vol. 4, No. 1, Feburary 2014, pp. 93~100 ISSN: 2088-8708 93 A Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving

More information

Enhanced Play Fair Cipher

Enhanced Play Fair Cipher P Enhanced Play Fair Cipher 1 1 Naveen KMP P, PDepartment of Information Technology, Velammal Engineering College, Chennai, Tamil Nadu, India. Abstract The theme of this research work is to design and

More information

A Proposed Cipher Technique with a Study of Existing Cryptography Techniques

A Proposed Cipher Technique with a Study of Existing Cryptography Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

A New variant of Hill Cipher Algorithm for Data Security

A New variant of Hill Cipher Algorithm for Data Security Volume 117 No. 15 2017, 581-588 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A New variant of Hill Cipher Algorithm for Data Security Kalaichelvi

More information

A Modified Playfair Cipher for a Large Block of Plaintext

A Modified Playfair Cipher for a Large Block of Plaintext International Journal of Computer Theory and Engineering, Vol 1, No 5, Decemer, 2009 A Modified layfair Cipher for a Large Block of laintext V Umakanta Sastry, N Ravi Shankar, and S Durga Bhavani Astract

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

A Block Cipher Involving a Key Matrix and a Key bunch Matrix, Supplemented with Mix

A Block Cipher Involving a Key Matrix and a Key bunch Matrix, Supplemented with Mix Research Inventy: International Journal Of Engineering And Science Vol., Issue 9 (April 3), Pp - Issn(e): 7-47, Issn(p):-643, Www.Researchinventy.Com A Block Cipher Involving a Key Matrix a Key bunch Matrix,

More information

A Block Cipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix

A Block Cipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix Journal of omputer Science 4 (): 7-4, 8 ISSN 549-3636 8 Science Publications A Block ipher using Feistal s Approach Involving Permutation and Mixing of the Plaintext and the Additive Inverse of Key Matrix

More information

Design and Analysis of New Symmetric Block Cipher Algorithm

Design and Analysis of New Symmetric Block Cipher Algorithm Design and Analysis of New Symmetric Block Cipher Algorithm KALAICHELVI V && MANIMOZHI K Asst. Professor, SRC- SASTRA University, Kumbakonam, India E-mail: kalaichelvi2k@yahoo.com Abstract Cryptography

More information

Webpage: Volume 5, Issue VII, July 2017 ISSN

Webpage:   Volume 5, Issue VII, July 2017 ISSN Image Security using Non-Linear Data Structure Dr. S. Kiran 1, R. Pradeep Kumar Reddy 2, V. Siva Kumar 3, P. Veereshkumar Goud 4 1,2 Assistant Professor, 3,4 Student 1,2,3,,4 Dept. of CSE, YSR Engineering

More information

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7596-7576 Multi-Level Encryption using SDES Key Generation Technique with

More information

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings

10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings 1 Chapter 2 Classical Encryption Techniques "I am fairly familiar with all the forms of secret writings, and am myself the author of

More information

Classical Encryption Techniques. CSS 322 Security and Cryptography

Classical Encryption Techniques. CSS 322 Security and Cryptography Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time

More information

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public

More information

A Proposed Method for Cryptography using Random Key and Rotation of Text

A Proposed Method for Cryptography using Random Key and Rotation of Text Volume 6, No.2, March - April 2017 Mousumi Ghanti et al., International Journal of Advanced Trends in Computer Science and Engineering, 6(2), March - April 2017, 18-22 Available Online at http://www.warse.org/ijatcse/static/pdf/file/ijatcse03622017.pdf

More information

Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process

Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process To cite this article: A Subandi

More information

Chapter 2: Classical Encryption Techniques

Chapter 2: Classical Encryption Techniques CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 2: Classical Encryption Techniques Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Introduction Basic

More information

International Journal of Computer Engineering and Applications, ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD

International Journal of Computer Engineering and Applications, ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, www.ijcea.com ISSN 2321-3469 ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD Namrata

More information

A Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix

A Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix IAENG International Journal of Computer Science, 32:4, IJCS_32_4_ A Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix S. Udaya Kumar V. U. K.

More information

A NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS

A NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS IJRET: International Journal of Research in Engineering and Technology eissn: 2319-1163 pissn: 2321-738 A NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS Kalavathi Alla 1, Sai Jyothi B 1,2

More information

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There

More information

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM ENCRYPTION USING LESTER HILL CIPHER ALGORITHM Thangarasu.N Research Scholar in Department of Computer Science Bharathiar University,Coimbatore Dr.Arul Lawrence SelvaKumar Dean & Professor, Department of

More information

Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm

Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm ISSN : 0974 5572 International Science Press Volume 9 Number 40 2016 Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm D. Anitha a S. Aruna a Mathew a K. Mathew a and Devilal

More information

Diversified Caesar Cipher for Impeccable Security

Diversified Caesar Cipher for Impeccable Security Vol.11, No.3 (2017), pp.33-40 http://dx.doi.org/10.14257/ijsia.2017.11.2.04 Diversified Caesar Cipher for Impeccable Security 1 Priya Verma, 2 Gurjot Singh Gaba, 3 Rajan Miglani * 1,2,3 Discipline of Electronics

More information

A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security

A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security A Universal Session Based Bit Level Symmetric Key Cryptographic Technique to Enhance the Information Security Manas Paul 1 and Jyotsna Kumar Mandal 2 1 Dept. of Comp. Application, JIS College of Engineering,

More information

Name of chapter & details.

Name of chapter & details. Course Title Course Code Information Security IT707 Theory : 03 Course Credit Practical : 01 Tutorial : 00 Course Learning Outcomes Credits : 04 On the completion of the course, students will be able to:

More information

Hardware Design and Software Simulation for Four Classical Cryptosystems

Hardware Design and Software Simulation for Four Classical Cryptosystems Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 21 (2013 ) 500 505 The 4 th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013)

More information

PART THREE. PoIygraphlc Substitution Systems CHARACTERISTICS OF POLYGRAPHIC SUBSTITUTION SYSTEMS

PART THREE. PoIygraphlc Substitution Systems CHARACTERISTICS OF POLYGRAPHIC SUBSTITUTION SYSTEMS PART THREE PoIygraphlc Substitution Systems CHARACTERISTICS OF POLYGRAPHIC SUBSTITUTION SYSTEMS CHAPTER 6 Section I Characteristics of Polygraphic Encipherment 6-1. Types of Polygraphic Systems As first

More information

CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology

CSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology CSEC 507: APPLIED CRYPTOLOGY Middle East Technical University Ankara, Turkey Last Modified: December 9, 2015 Created: August 5, 2015 What is Cryptology, Cryptography, and Cryptanalysis? (A Short) Definition

More information

Combination of RGB Substitution for Text to Image Encryption Technique using AES

Combination of RGB Substitution for Text to Image Encryption Technique using AES Combination of RGB Substitution for Text to Image Encryption Technique using AES Sourabh Singh 1 Department of Computer Science and Engineering Radharaman Institute of Technology and Science Bhopal (M.P),

More information

Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and Key

Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and Key International Journal of Computer Networks and Security, ISSN:25-6878, Vol.23, Issue.2 7 Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and

More information

Rashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,

Rashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015, SMS Encryption Rashmi P. Sarode *, Neeraj Manglani Department of Computer Science Jagan Nath University, Jaipur, India Abstract In the application of Computer Science, the performance of classification

More information

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India

Dr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India Vol., No., A Block Cipher Involving a Key Bunch Matrix an Additional Key Matrix, Supplemented with Modular Arithmetic Addition supported by Key-based Substitution Dr. V.U.K.Sastry Professor (CSE Dept),

More information

K Anup Kumar et al,int.j.comp.tech.appl,vol 3 (1), 32-39

K Anup Kumar et al,int.j.comp.tech.appl,vol 3 (1), 32-39 A Modified Feistel Cipher Involving a Key as a Multiplicant on Both the Sides of the Plaintext Matrix and Supplemented with Mixing, Permutation, and Modular Arithmetic Addition 1 V.U.K. Sastry, 2 K. Anup

More information

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322

More information

PART I Symmetric Ciphers

PART I Symmetric Ciphers PART I Symmetric Ciphers CHAPTER 2 Classical Encryption Techniques Cryptography, Cryptanalysis Caesar cipher, Monoalphabetic ciphers Playfair cipher, Hill cipher Polyalphabetic ciphers One-time Pad 2.3

More information

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

ASCII BASED ENCRYPTION DECRYPTION TECHNIQUE FOR INFORMATION SECURITY AND COMMUNICATION

ASCII BASED ENCRYPTION DECRYPTION TECHNIQUE FOR INFORMATION SECURITY AND COMMUNICATION ASCII BASED ENCRYPTION DECRYPTION TECHNIQUE FOR INFORMATION SECURITY AND COMMUNICATION Er. Suraj Arya 1, Dr.Ankit Kumar 2 1 Research Scholar,Baba Mastnath University, Rohtak, Haryana,(INDIA) 2 Assistant

More information

AN EFFECTIVE PERFORMANCE EVALUATION OF RC6, BLOWFISH, DES ALGORITHMS

AN EFFECTIVE PERFORMANCE EVALUATION OF RC6, BLOWFISH, DES ALGORITHMS Volume 2, Issue 7, PP:, SEPTEMBER 2014. AN EFFECTIVE PERFORMANCE EVALUATION OF RC6, BLOWFISH, DES ALGORITHMS P. Sagar Babu 1*, Prof.Ch.Srinivasa Kumar 2* 1. II. M.Tech (VLSI), Dept of ECE, AM Reddy Memorial

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina 01/20/2015 2 Cryptography Study of schemes used for encryption Can be characterized by type of encryption

More information

Proposal for Scrambled Method based on NTRU

Proposal for Scrambled Method based on NTRU Proposal for Scrambled Method based on NTRU Ahmed Tariq Sadiq Computer Science Department University of Technology Baghdad, Iraq Najlaa Mohammad Hussein Computer Science Department Baghdad University Baghdad,

More information

C = E(p) = (p + k) mod (n) p = D(C) = (C k) mod (n)

C = E(p) = (p + k) mod (n) p = D(C) = (C k) mod (n) Substitutions ciphers (monoalphabetic) A substitution technique is one in which the characters of plaintext are replaced by other characters or by numbers or symbols. If the plaintext is viewed as a sequence

More information

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel

More information

C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan

C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Enhancing DES Using Local Languages C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Abstract: Network services and internet plays vital role in transmitting information from source to destination.

More information

ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION

ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION ENHANCED AES ALGORITHM FOR STRONG ENCRYPTION V. Sumathy & C. Navaneethan Assistant Professor, Department of CSE, Kingston Engineering College, Vellore, Tamil Nadu, India ABSTRACT In this paper we present

More information

Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication

Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication K.Arul Jothy, Final Year, Department of Computer Science and Engineering, JCT College

More information

An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android

An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android Journal of Physics: Conference Series PAPER OPEN ACCESS An implementation of super-encryption using RC4A and MDTM cipher algorithms for securing PDF Files on android To cite this article: M A Budiman et

More information

Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition

Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition Journal of Computer Science 6 (2): 133-140, 2010 ISSN 1549-3636 2010 Science Publications Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition K. Anup Kumar and V.U.K.

More information

Combining TCP and UDP for Secure Data Transfer

Combining TCP and UDP for Secure Data Transfer ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 8(S9), 285 291, May 2015 DOI: 10.17485/ijst/2015/v8iS9/65569 Combining TCP and UDP for Secure Data Transfer

More information

International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY

International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY Scientific Journal of Impact Factor (SJIF): 3134 ISSN (Print): 2348-6406 ISSN (Online): 2348-4470 International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS

More information

Evolution of Sha-176 Algorithm

Evolution of Sha-176 Algorithm IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 2, Issue 2 (July-Aug. 2012), PP 18-22 Evolution of Sha-176 Algorithm Piyush Garg 1, Namita Tiwari 2 1,2 (Computer Science and Engineering,

More information

Secure Encryption Using Armstrong Number,Color Code ASCII and Prime Number

Secure Encryption Using Armstrong Number,Color Code ASCII and Prime Number Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 6 (2017), pp. 1257-1265 Research India Publications http://www.ripublication.com Secure Encryption Using Armstrong Number,Color

More information

International Journal of Advance Research in Engineering, Science & Technology

International Journal of Advance Research in Engineering, Science & Technology Impact Factor (SJIF): 4.542 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 4, Issue 4, April-2017 Asymmetric Key Based Encryption

More information

Exploring Cryptography Using CrypTool

Exploring Cryptography Using CrypTool NEMATYC 2018 Exploring Cryptography Using CrypTool Valeria D Orazio Massachusetts Maritime Academy Importance of Cryptography 1998 Project start Originated as an internal business application for information

More information

Cryptography Functions

Cryptography Functions Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)

More information

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric

More information

Block Encryption and DES

Block Encryption and DES Block Encryption and DES Plain Text Block 1 Block 2 Block 3 Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available

More information

Classical Encryption Techniques

Classical Encryption Techniques Classical Encryption Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL

Cryptography and Network Security. Lecture 02 Symmetric Encryption. Ediz ŞAYKOL Cryptography and Network Security Lecture 02 Symmetric Encryption Ediz ŞAYKOL Symmetric Encryption or conventional / private-key / single-key sender and recipient share a common key all classical encryption

More information

Cryptography. What is Cryptography?

Cryptography. What is Cryptography? Cryptography What is Cryptography? Cryptography is the discipline of encoding and decoding messages. It has been employed in various forms for thousands of years, and, whether or not you know it, is used

More information

BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM

BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM MAHENDRAN R Assistant professor, Dept of computer science, Puthanampatti ABSTRACT In this modern electronic age we need to protect sensitive and valuable information

More information

MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT) Rajdeep Chakraborty* 1, Avishek Datta 2, J.K. Mandal 3

MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT) Rajdeep Chakraborty* 1, Avishek Datta 2, J.K. Mandal 3 ISSN 2277-2685 IJESR/Feb 2015/ Vol-5/Issue-2/76-81 Rajdeep Chakraborty et. al./ International Journal of Engineering & Science Research MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT)

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 2.2 Secret Key Cryptography CSC 474/574 Dr. Peng Ning 1 Agenda Generic block cipher Feistel cipher DES Modes of block ciphers Multiple encryptions Message

More information

IN ORMATION THEORY TESTS BASED PER ORMANCE EVALUATION O CRYPTOGRAPHIC TECHNIQUES

IN ORMATION THEORY TESTS BASED PER ORMANCE EVALUATION O CRYPTOGRAPHIC TECHNIQUES International Journal of Information Technology and Knowledge Management July-December 2008, Volume 1, No. 2, pp. 475-483 IN ORMATION THEORY TESTS BASED PER ORMANCE EVALUATION O CRYPTOGRAPHIC TECHNIQUES

More information

FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E

FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E Amandeep Singh, Manu Bansal Abstract - Data Security is an important parameter for the industries. It can be achieved by Encryption

More information

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Vol 1, Issue 2, April 2013 Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Krishnappa H K 1, N K Srinath 2 and S Manjunath 3 Assistant Professor, Dept of

More information

Light Weight Cellular Automata Computations and Symmetric Key for Achieving Efficient Cryptography

Light Weight Cellular Automata Computations and Symmetric Key for Achieving Efficient Cryptography International Journal of Emerging Engineering Research and Technology Volume 3, Issue 12, December 2015, PP 84-91 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Light Weight Cellular Automata Computations

More information

Computational Security, Stream and Block Cipher Functions

Computational Security, Stream and Block Cipher Functions Computational Security, Stream and Block Cipher Functions 18 March 2019 Lecture 3 Most Slides Credits: Steve Zdancewic (UPenn) 18 March 2019 SE 425: Communication and Information Security 1 Topics for

More information

Reversible Data Hiding in Encrypted Images with Private Key Cryptography

Reversible Data Hiding in Encrypted Images with Private Key Cryptography Reversible Data Hiding in Encrypted Images with Private Key Cryptography Wajahath Hussain Razvi, Dr.Ch.Samson Abstract This project proposes a reversible scheme for cipher images which are encrypted using

More information

ANALYSIS OF AES ENCRYPTION WITH ECC

ANALYSIS OF AES ENCRYPTION WITH ECC ANALYSIS OF AES ENCRYPTION WITH ECC Samiksha Sharma Department of Computer Science & Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India Vinay Chopra Department of Computer

More information

Application of Two-dimensional Periodic Cellular Automata in Image Processing

Application of Two-dimensional Periodic Cellular Automata in Image Processing International Journal of Computer, Mathematical Sciences and Applications Serials Publications Vol. 5, No. 1-2, January-June 2011, pp. 49 55 ISSN: 0973-6786 Application of Two-dimensional Periodic Cellular

More information

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Ensuring information security through 123-bit recursive substitution of bits through prime-nonprime detection of sub-stream (RSBP)

Ensuring information security through 123-bit recursive substitution of bits through prime-nonprime detection of sub-stream (RSBP) Journal of Scientific & Industrial Research 584 Vol. 68, July 2009, pp. 584-591 J SCI IND RES VOL 68 JULY 2009 Ensuring information security through 123-bit recursive substitution of bits through prime-nonprime

More information

A Survey On SecureImage Encryption Technique Using Blowfish And Chaos

A Survey On SecureImage Encryption Technique Using Blowfish And Chaos A Survey On SecureImage Encryption Technique Using Blowfish And Chaos Romani Patel 1,Krunal Panchal 2 1 Research Scholar, Information Technology, L.J Institute Of Engineering And Technology, Ahmedabad,

More information

6. Symmetric Block Cipher BLOWFISH Performance. Memory space. 3. Simplicity The length of the key. The length of the data block is 64.

6. Symmetric Block Cipher BLOWFISH Performance. Memory space. 3. Simplicity The length of the key. The length of the data block is 64. belongs to the same class of conventional symmetric ciphers. The basic principles of have been published in 1994 by Bruce Schneier, as an alternative to the Data encryption standard (DES) to satisfy the

More information

Variable Key : A new investigation in cryptography and results thereoff

Variable Key : A new investigation in cryptography and results thereoff Variable Key A new investigation in cryptography and results thereoff P. Chakrabarti 1, LMISTE C.T.Bhunia 2, B. Bhuyan 3 1 Bengal Institute of Technology and Management, Santiniketan, West Bengal, Pin-731236,India

More information

An Efficient FPGA Implementation of the Advanced Encryption Standard (AES) Algorithm Using S-Box

An Efficient FPGA Implementation of the Advanced Encryption Standard (AES) Algorithm Using S-Box Volume 5 Issue 2 June 2017 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org An Efficient FPGA Implementation of the Advanced Encryption

More information

Cryptography and Network Security. Saint Leo University. COM 450- Network Defense and Security. Instructor: Dr. Omar.

Cryptography and Network Security. Saint Leo University. COM 450- Network Defense and Security. Instructor: Dr. Omar. Saint Leo University COM 450- Network Defense and Security Instructor: Dr. Omar Group members: Ivanna, Tracey, Romario, Chevon March 13, 2018 Abstract This paper will look at different aspects of Cryptography,

More information

Analysis of Cryptography and Pseudorandom Numbers

Analysis of Cryptography and Pseudorandom Numbers ISSN: 2454-2377 Volume 2, Issue 2, June 2016 Analysis of Cryptography and Pseudorandom Numbers Richa Agarwal Student, M. Tech., Computer Science, Invertis University, Bareilly, India Abstract: With the

More information

Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA

Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

International Journal of Mathematics Trends and Technology- Volume29 Number2 January 2016

International Journal of Mathematics Trends and Technology- Volume29 Number2 January 2016 International Journal of Mathematics Trends and Technology Volume Number January Symmetric Key Cryptosystem for Multiple Encryptions A. ChandraSekhar*,, D. Chaya Kumari #, S. Ashok Kumar * * Department

More information

A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS

A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS Volume 116 No. 6 2017, 149-153 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET

More information

Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect

Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect 244 Performance enhancement of Blowfish and CAST-128 algorithms and Security analysis of improved Blowfish algorithm using Avalanche effect Krishnamurthy G.N, Dr. V. Ramaswamy, Leela G.H and Ashalatha

More information