International Journal of Computer Engineering and Applications, ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD
|
|
- Jerome Bridges
- 6 years ago
- Views:
Transcription
1 International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD Namrata Singh 1, Abhigyan Tiwari 2, Dr.Amit Shrivastava 3, Dr. Manish Manoriya 4 1 Student of Computer Science & Engineering SIRTS, Bhopal (Madhya Pradesh),India 2,3,4 Department of Computer Science & Engineering SIRTS,Bhopal(Madhya Pradesh),India ABSTRACT: In network communication system, security is playing most important role. So, for security purpose we are using Cryptography techniques in network communication & Internet. Cryptography is the science by which a readable message (Plain text) will be converting into non-readable message (Cipher text). Substitution and Transposition are two classical methods of Cryptography. In this paper I will discuss about earlier developed few Transposition techniques and a technique by which we can encrypt & decrypt the text which is NEWSO Transposition Method. This technique is the combination of reverse & clockwise rotation technique with directions. More Technique More Security by keeping this in mind I have proposed this method. This paper basically describes transposition method because transposition method is the combination of confusion & diffusion. Keywords: - Cryptography, Clockwise rotation, Encryption, Reverse Method. Namrata Singh, Abhigyan Tiwari, Dr.Amit Shrivastava, Dr. Manish Manoriya 71
2 ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD [1] INTRODUCTION: In today s world, the modern era is dominated by paperless transactions in business, private or government offices. Due to this there is a great need of protection or security. To protect sensitive text information from unauthorized access cryptography techniques are used. Cryptography or Cryptology, from Greek words, kryptos (hidden or secret) & graphein (writing or study) respectively, is the practice and study of techniques to protect communication in the presence of third party. Cryptography is often called code making. Encryption and Decryption are the two terms of Cryptography which is more important in it. Encryption refers that sensible text (readable text or plain text) converted into insensible text (nonreadable text or cipher text) & just the inverse process of encryption i.e. the cipher text converted into plain text is known as decryption. Plain Text (Hello) Encryption Cipher Text (Y%#23) Cipher Text (Y%#23) Decryption Plain Text (Hello) Figure :1. Encryption and Decryption Process There are two primary ways by which a plain text can be encrypt or decrypt. They are Substitution and Transposition. [2] BACKGROUND STUDY: The Transposition technique performs some permutation over the plain text alphabets that mean the rearrangement of letters in plain text according a rule can make plain text message to cipher text and the receiver decrypt the message by performing the inverse transposition method. Some of them are given below- 1. Rail Fence Cipher Namrata Singh, Abhigyan Tiwari, Dr.Amit Shrivastava, Dr. Manish Manoriya 72
3 International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN Simple Columnar 3. Simple Columnar with Multiple rounds 4. Vernam Cipher 5. Route Cipher 6. Myszkowski Cipher 7. Combination 8. Grilles The brief description are given below- 1. Rail Fence Cipher :- The Rail Fence cipher gets its name from the way in which it is encoded. It involves writing of plain text as sequence of diagonals and then reading it row-by-row to produce cipher text. For example, the original plain text message is SIRTS IS THE BRANCH OF SIRT and the cipherer writes out: S R S S H B A C O S R I T I T E R N H F I T Then reads off: SRSSHBACOSRITITERNHFIT It is quite simple to break into for cryptanalyst. 2. Simple Columnar Technique:- In Simple Columnar transposition, the message is written out in row-by-row in a rectangle of a pre-defined length and then read out column by column and the columns are chosen in some random order. For example, the above message will be look Like Figure 2. Figure: 2. Example of Simple Columnar Then the order of columns as some random order i.e. 4, 6, 1, 2, 5 and 3. The text read as TEHTIRFSSASITNISBORHCR 3. Simple Columnar with Multiple rounds:- In Simple columnar there is a drawback which is it is easy just like Rail Fence, to improve this technique we use the Simple columnar technique by using again and again. It means to use the same basic procedure more than once. For example, In above simple columnar if we again apply that procedure. The cipher text after one round are looking as given below- Namrata Singh, Abhigyan Tiwari, Dr.Amit Shrivastava, Dr. Manish Manoriya 73
4 ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD TEHTIRFSSASITNISBORHCR Then apply second round on it, the message will be look like- Figure:3. Example of Columnar with Multiple rounds This is much more complex to crack as compared to the basic technique. 4. Route Cipher:- In it the plain text is written out in the grid and use the route assigned. For example, the message will be look like S T S E A H S T I S T B N O I J R I H R C F R X Then reads off- TJXRFCRHIRISTSEAHSIONBTS For decryption, the size of grid and the route used is necessary. 5. Vernam Cipher:- The Vernam Cipher is also called as One-Time pad because there is an identical random sequence of letters which was previously somehow produced and securely issued to sender and receiver. The plain text alphabets treated as number in increasing sequence i.e. A=0,B=1,..Z=25. For example, the plain text message HELLO using a one-time pad NQCFJ and the process will be look like- Plain Text H E L L O One-Time Pad N Q C F J Total Cipher Text U U N Q X Figure 2: Example of Vernam Cipher Thus the cipher text which we have got is UUNQX. If there is greater than 26 in total, then subtract 26 from it. 6. Combination: - Namrata Singh, Abhigyan Tiwari, Dr.Amit Shrivastava, Dr. Manish Manoriya 74
5 International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN The combination of substitution cipher and columnar transposition will produce a new technique which avoids the weakness of both. 7. Grilles:- It is also known as physical masks with cut-outs. It produces a highly irregular transposition over the period specified by the size of the grilles, but requires the correspondents to keep a physical key secret. [3] PROPOSED METHODOLOGY & EXPECTED OUTCOME: In this section I am going to present my new methodology which name is given as NEWSO Transposition Method. In it as name given I have used the direction as well as rotation also. 1. Process of Encryption- The encryption process of our method which are given below- Step1:- Firstly the plain text message on which we are going to apply our method i.e. SIRTS IS THE BRANCH OF SIRT. Step2:- Take the prime no. position which are 1, 2, 3, 5, 7.etc. on above plain text message just like given below- S I R T S I S T H E B R A N C H O F S I R T Separate the prime no. position letters are- RTITRNFI Reverse of them are given below- IFNRTITR Step 3:- Then remaining letters are- SISSHEBACHOSRT Step4:- The remaining letters then separate by half and reverse them both like that- SISSHEB+ACHOSRT BEHSSIS+TRSOHCA BEHSSISTRSOHCA Step5:- Combine both step 2, 4 and then the first level encrypted message will be look like- IFNRTITRBEHSSISTRSOHCA The total encryption algorithm of first level are given below- Take prime no. position letters and reverse them + Remaining characters separate by half (First half reverse + Second half reverse) Step6:- Everybody knows the directions position in map which are given below- North (N) West (W) East (E) Namrata Singh, Abhigyan Tiwari, Dr.Amit Shrivastava, Dr. Manish Manoriya 75
6 ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD South (S) Figure 3: The directions in map Step7:- The first level encrypted message letters will be separated by 4 because there are 4 directions. The message will be look like- IFNR TITR BEHS SIST RSOH CA Step 8:- So, simply apply the separated message on direction wise (in way of N-E-W-S) which is given below- (i) I (ii) T N F T I R R (iii) B (iv) S H E S I S T (v) R (vi) C O S A H Step9:- Then, in all clock-wise rotation (Shift by 1) apply and the encrypted message will be look like- NIFRTTIRHBESSSITORSHCA After that the decryption process of our method are given below- Step1:- For decryption, we separate the cipher text message with 4. The cipher text will be look like- NIFR TTIR HBES SSIT ORSH CA Step2:- Keep all the letters in direction wise (in way of N-E-W-S) & then in anti-clockwise rotation which are given below- Namrata Singh, Abhigyan Tiwari, Dr.Amit Shrivastava, Dr. Manish Manoriya 76
7 International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN (i) N (ii) T F I I T (iii) H (iv) S E B I S R S T (v) O (vi) C S R A H Step 3:- Then reads the message will be find out- IFNRTITRBEHSSISTRSOHCA Step4:- There are 22 letters such that we can say that the prime no. will be 2, 3, 5, 7, 11, 13, 17 and 19 i.e. 8,so separate them with 8 and remaining 14 characters which will be look like- IFNRTITR + BEHSSISTRSOHCA (First encrypted message) + (Second encrypted message) Step5:- Reverse the first encrypted message which will be like that- RTITRNFI Step6:- Take second encrypted message and separate by half like that- BEHSSIS + TRSOHCA Namrata Singh, Abhigyan Tiwari, Dr.Amit Shrivastava, Dr. Manish Manoriya 77
8 ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD Step7:- Reverse both of above separated and encrypted message which will be SISSHEB + ACHOSRT Step8:- First encrypted and second encrypted message we have got this- RTITRNFI + SISSHEBACHOSRT Step9:- In the last we have to put their position characters in that and we have got our plain text message- SIRTS IS THE BRANCH OF SIRT [4] CONCLUSION: Today s we have many cryptography techniques to secure our communication system depending upon our needs. More methods more security by keeping this in our mind I have described this method in this paper. REFERENCES: 1] Preeti Poonia, Praveen Kantha, Comparative Study of Various Substitution and Transposition Encryption Techniques, International Journal of Computer Applications, Volume 145, No. 10, July ] Er. Reema Gupta, Dr. Sukhvir Singh, Pardeep Maan, Efficient Encryption Technique in Cryptography Better Security Enhancement, International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Volume 4, Issue 5, May ] Yashpalsingh Rajput, Dnyaneshwar Naik, Charudatt Mane, An Improvement Cryptographic Technique to Encrypt Text Using Double Encryption, International Journal of Computer Applications, Volume 86, No. 6, January ] Kashish Goyal, Supriya Kinger, Modified Caesar Cipher for Better Security Enhancement, International Journal of Computer Applications, Volume 73, No. 3, July ] Mu. Annalakshmi, A. Padmapriya, Zigzag Ciphers: A Novel Transposition Method, International Conference on Computing and Information Technology (IC2IT-2013) & International Journal of Computer Applications ( ), ] Sombir Singh, Sunil K. Maakar, Dr. Sudesh Kumar, Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques, International Journals of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 6, June ] S G Srikantaswamy, Dr. H D Phaneendra, Improved Caesar Cipher with Random Number Generation Technique and multistage encryption, International Journal of Computing and Information Sciences, vol. 2, No. 4, December ] Ajit Singh, Aarti Nandal, Swati Malik, Implementation of Caesar cipher with Rail Fence for Enhancing Data Security, IJARCSSE, Volume 2, Issue 12, December ] Prof. S.D. Padiya, Prof. D. N. Daknane, Plaintext Based Transposition Method, IJARCSSE, Volume 2, Issue 7, July ] Mohammed AbuTaha, Mousa Farajallah, Radwan Tahboub, Mohammed Odeh, Survey Paper: Cryptography is the Science of Information Security, Vol. 5, Issue 3, 2011 in IJCSS. Namrata Singh, Abhigyan Tiwari, Dr.Amit Shrivastava, Dr. Manish Manoriya 78
CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext
CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public
More informationChapter 3 Traditional Symmetric-Key Ciphers 3.1
Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationA Proposed Cipher Technique with a Study of Existing Cryptography Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationClassical Encryption Techniques. CSS 322 Security and Cryptography
Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time
More informationInternational Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY
Scientific Journal of Impact Factor (SJIF): 3134 ISSN (Print): 2348-6406 ISSN (Online): 2348-4470 International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview
Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science
More informationA Modified Playfair Encryption Using Fibonacci Numbers
A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability
More informationA Proposed Method for Cryptography using Random Key and Rotation of Text
Volume 6, No.2, March - April 2017 Mousumi Ghanti et al., International Journal of Advanced Trends in Computer Science and Engineering, 6(2), March - April 2017, 18-22 Available Online at http://www.warse.org/ijatcse/static/pdf/file/ijatcse03622017.pdf
More informationCombination of RGB Substitution for Text to Image Encryption Technique using AES
Combination of RGB Substitution for Text to Image Encryption Technique using AES Sourabh Singh 1 Department of Computer Science and Engineering Radharaman Institute of Technology and Science Bhopal (M.P),
More informationEnhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication
Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication K.Arul Jothy, Final Year, Department of Computer Science and Engineering, JCT College
More informationPriya Soni, Ritu Hedau
ABSTRACT International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 A Review Paper on Cryptography and Plaintext
More informationClassical Encryption Techniques
Classical Encryption Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationOverview of Conventional Encryption Techniques
Overview of Conventional Encryption Techniques Shadab Pasha CDGI,Indore shadabpasha@gmail.com Abstract: Symmetric Encryption or Single-key Encryption or Conventional Encryption was only the type of encryption
More informationBlock Ciphers and Data Encryption Standard. CSS Security and Cryptography
Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322
More informationClassical Encryption Techniques
Encryption CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L02, Steve/Courses/2011/S2/CSS322/Lectures/classical.tex,
More informationDiversified Caesar Cipher for Impeccable Security
Vol.11, No.3 (2017), pp.33-40 http://dx.doi.org/10.14257/ijsia.2017.11.2.04 Diversified Caesar Cipher for Impeccable Security 1 Priya Verma, 2 Gurjot Singh Gaba, 3 Rajan Miglani * 1,2,3 Discipline of Electronics
More informationSankalchand Patel College of Engineering, Visnagar B.E. Semester V (CE/IT) INFORMATION SECURITY Practical List
1. IMPLEMENT CAESAR CIPHER WITH VARIABLE KEY It is an encryption technique in which each plaintext letter is to be replaced with one a fixed number of places (in following implementation, key) down the
More informationBlock Encryption and DES
Block Encryption and DES Plain Text Block 1 Block 2 Block 3 Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available
More informationCryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái
Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There
More informationCSCE 813 Internet Security Symmetric Cryptography
CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability
More informationABSTRACT. system, specifically on a network and the internet. Developing applications using data
ABSTRACT Security is one of the important features in the field of communication system, specifically on a network and the internet. Developing applications using data encryption techniques for ensuring
More informationMulti-Level Encryption using SDES Key Generation Technique with Genetic Algorithm
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7596-7576 Multi-Level Encryption using SDES Key Generation Technique with
More informationOutline Basics of Data Encryption CS 239 Computer Security January 24, 2005
Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 What is data encryption? Basic encryption mechanisms Stream and block ciphers Characteristics of good ciphers Page 1 Page 2 Data
More informationENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM Thangarasu.N Research Scholar in Department of Computer Science Bharathiar University,Coimbatore Dr.Arul Lawrence SelvaKumar Dean & Professor, Department of
More informationChapter 2: Classical Encryption Techniques
CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 2: Classical Encryption Techniques Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Introduction Basic
More informationOVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY
1 Information Transmission Chapter 6 Cryptology OVE EDFORS ELECTRICAL AND INFORMATION TECHNOLOGY Learning outcomes After this lecture the student should undertand what cryptology is and how it is used,
More informationA New variant of Hill Cipher Algorithm for Data Security
Volume 117 No. 15 2017, 581-588 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A New variant of Hill Cipher Algorithm for Data Security Kalaichelvi
More informationIntroduction Classical Confidentiality Modern Confidentiality Integrity Authentication
Cryptography Introduction Classical Confidentiality Modern Confidentiality Integrity Authentication Introduction Cryptography in the Real World Cryptography is the process of writing or reading secret
More informationModule 1: Classical Symmetric Ciphers
Module 1: Classical Symmetric Ciphers Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Introduction to Cryptography Terms and Concepts
More informationNature Sunday Academy Lesson Plan
Title Computer Security Description: Nature Sunday Academy Lesson Plan 2013-14 The objective of the lesson plan aims to help students to understand the general goals of security, the essential concerns
More informationPART I Symmetric Ciphers
PART I Symmetric Ciphers CHAPTER 2 Classical Encryption Techniques Cryptography, Cryptanalysis Caesar cipher, Monoalphabetic ciphers Playfair cipher, Hill cipher Polyalphabetic ciphers One-time Pad 2.3
More informationSubstitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.
Substitution Ciphers, continued 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet. Non-periodic case: Running key substitution ciphers use a known text (in a standard
More information2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography
CS 472 Network and System Security Mohammad Almalag malmalag@cs.odu.edu Lecture 2 January 22, 2013 Introduction To Cryptography 1 Definitions Cryptography = the science (art) of encryption Cryptanalysis
More informationCCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 7 Cryptographic Systems 2012 Cisco and/or its affiliates. All rights reserved. 1 Explain how cryptology consists of cryptography (encoding messages) and
More informationCryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.
Telling Secrets Secret Writing Through the Ages William Turner Department of Mathematics & Computer Science Wabash College Crawfordsville, IN 47933 Tuesday 4 February 2014 W. J. Turner Telling Secrets
More informationMODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT) Rajdeep Chakraborty* 1, Avishek Datta 2, J.K. Mandal 3
ISSN 2277-2685 IJESR/Feb 2015/ Vol-5/Issue-2/76-81 Rajdeep Chakraborty et. al./ International Journal of Engineering & Science Research MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT)
More informationInternational Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17, ISSN
International Journal of Computer Engineering and Applications, Volume XI, Issue XII, Dec. 17, www.ijcea.com ISSN 2321-3469 DYNAMIC SELECTION OF ALGORITHM TO IMPROVE SECURITY Amit Jain 1 1 Computer Science
More informationInformation Systems Security
Information Systems Security Dr. Ayman Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Chapter 2 Classical Encryption Techniques
More informationExploring Cryptography Using CrypTool
NEMATYC 2018 Exploring Cryptography Using CrypTool Valeria D Orazio Massachusetts Maritime Academy Importance of Cryptography 1998 Project start Originated as an internal business application for information
More informationAn Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion
Volume 117 No. 20 2017, 325-330 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu An Adaptive Play fair Cipher Algorithm for Secure Communication Using
More informationIntroduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014
Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers
More informationUNIT - II Traditional Symmetric-Key Ciphers. Cryptography & Network Security - Behrouz A. Forouzan
UNIT - II Traditional Symmetric-Key Ciphers 1 Objectives To define the terms and the concepts of symmetric key ciphers To emphasize the two categories of traditional ciphers: substitution and transposition
More information10/3/2017. Cryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings 1 Chapter 2 Classical Encryption Techniques "I am fairly familiar with all the forms of secret writings, and am myself the author of
More information2
1 2 3 4 5 Basic Terminology plaintext - the original message ciphertext - the coded message cipher - algorithm for transforming plaintext to ciphertext key - info used in cipher known only to sender/receiver
More informationTraditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur
Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel
More informationEnhancement Caesar Cipher for Better Security
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 01-05 Enhancement Caesar Cipher for Better Security Programmer Enas Ismael
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 4.72 e-issn (O): 2348-4470 p-issn (P): 2348-66 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May-17 Comparaitive Analysis
More informationThe inverse of a matrix
The inverse of a matrix A matrix that has an inverse is called invertible. A matrix that does not have an inverse is called singular. Most matrices don't have an inverse. The only kind of matrix that has
More informationSurvey: Recent Modifications in Vigenere Cipher
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 49-53 Survey: Recent Modifications in Vigenere Cipher Ranju S Kartha
More informationProposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect
Proposed Model of Encryption Technique using Block Cipher Concept to Enhance Avalanche Effect 1 Aumreesh Saxena, 2 Sourabh Singh 1 Sagar Institute of Research Technology and Science, Bhopal, Madhya Pradesh
More informationClassical Cryptography. Thierry Sans
Classical Cryptography Thierry Sans Example and definitions of a cryptosystem Caesar Cipher - the oldest cryptosystem A shift cipher attributed to Julius Caesar (100-44 BC) MEET ME AFTER THE TOGA PARTY
More informationHybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm
ISSN : 0974 5572 International Science Press Volume 9 Number 40 2016 Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm D. Anitha a S. Aruna a Mathew a K. Mathew a and Devilal
More informationA SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET KEYS
Volume 116 No. 6 2017, 149-153 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu A SECURED SYMMETRIC KEY ENCRYPTION TECHNIQUE USING IMAGES AS SECRET
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 23 wenbing@ieee.org (Lecture notes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Introduction to
More informationA.Vinaya Babu Principal, JNTUCE J.N.T.U.H, Hyderabad A.P, India. Ravindra Babu Kallam Research Scholar, J.N.T.U, Hyderabad A.
An Impregnable Block Cipher Generation using Modern Transposition and Substitution Algorithms with a large Key, Modular Arithmetic and Integral Functions Ravindra Babu Kallam Research Scholar, J.N.T.U,
More informationFPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E
FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E Amandeep Singh, Manu Bansal Abstract - Data Security is an important parameter for the industries. It can be achieved by Encryption
More informationSecret Key Algorithms (DES)
Secret Key Algorithms (DES) G. Bertoni L. Breveglieri Foundations of Cryptography - Secret Key pp. 1 / 34 Definition a symmetric key cryptographic algorithm is characterized by having the same key used
More informationCryptography Introduction to Computer Security. Chapter 8
Cryptography Introduction to Computer Security Chapter 8 Introduction Cryptology: science of encryption; combines cryptography and cryptanalysis Cryptography: process of making and using codes to secure
More informationLecture 4: Symmetric Key Encryption
Lecture 4: Symmetric ey Encryption CS6903: Modern Cryptography Spring 2009 Nitesh Saxena Let s use the board, please take notes 2/20/2009 Lecture 1 - Introduction 2 Data Encryption Standard Encrypts by
More informationCSCE 715: Network Systems Security
CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina 01/20/2015 2 Cryptography Study of schemes used for encryption Can be characterized by type of encryption
More informationModified Playfair Cipher Using Random Key Linear Congruent Method
4 th INTERNATIONAL SEMINAR: RESEARCH FOR SCIENCE, TECHNOLOGY AND CULTURE (IRSTC 2017) Modified Playfair Cipher Using Random Key Linear Congruent Method Muhammad Syahrizal 1 *, Murdani 2, Surya Darma Nasution
More informationModule 13 Network Security. Version 1 ECE, IIT Kharagpur
Module 13 Network Security Lesson 40 Network Security 13.1.1 INTRODUCTION Network Security assumes a great importance in the current age. In this chapter we shall look at some of the security measures
More informationANALYSIS OF AES ENCRYPTION WITH ECC
ANALYSIS OF AES ENCRYPTION WITH ECC Samiksha Sharma Department of Computer Science & Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India Vinay Chopra Department of Computer
More informationA Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix
IAENG International Journal of Computer Science, 32:4, IJCS_32_4_ A Block Cipher Basing Upon a Revisit to the Feistel Approach and the Modular Arithmetic Inverse of a Key Matrix S. Udaya Kumar V. U. K.
More informationSecurity: Cryptography
Security: Cryptography Computer Science and Engineering College of Engineering The Ohio State University Lecture 38 Some High-Level Goals Confidentiality Non-authorized users have limited access Integrity
More informationCryptography. Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar. Submitted by:- Hardeep Gaurav Jain
Cryptography Submitted to:- Ms Poonam Sharma Faculty, ABS,Manesar Submitted by:- Hardeep Gaurav Jain Cryptography Cryptography, a word with Greek origins, means "secret writing." However, we use the term
More informationEnhancing the Security of Communication Using Encryption Algorithm Based on ASCII Values of Data
Vol.11, 3 (2017), pp.59-68 http://dx.doi.org/10.14257/ijsia.2017.11.2.06 Enhancing the Security of Communication Using Encryption Algorithm Based on ASCII Values of Data Farheen Qazi 1, Fozia Hanif Khan
More informationSecure Communication With Lossless Data Compression Using Dpd Encoding
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Secure Communication With Lossless Data Compression Using Dpd Encoding Er.Aradhana Raju 1, Purabi Mahato 2, Ritto K. Babu 3, Richi
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 158
Enhancing The Security Of Koblitz s Method Using Transposition Techniques For Elliptic Curve Cryptography Santoshi Pote Electronics and Communication Engineering, Asso.Professor, SNDT Women s University,
More informationSecret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34
Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34 Definition a symmetric key cryptographic algorithm is characterized by having the same key used for both encryption and decryption.
More informationWorksheet - Reading Guide for Keys and Passwords
Unit 2 Lesson 15 Name(s) Period Date Worksheet - Reading Guide for Keys and Passwords Background Algorithms vs. Keys. An algorithm is how to execute the encryption and decryption and key is the secret
More informationA New hybrid method in watermarking using DCT and AES
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 11 (November 2014), PP.64-69 A New hybrid method in watermarking using
More informationCryptographic Techniques. Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building
Cryptographic Techniques Information Technologies for IPR Protections 2003/11/12 R107, CSIE Building Outline Data security Cryptography basics Cryptographic systems DES RSA C. H. HUANG IN CML 2 Cryptography
More informationFile and Disk Encryption
File and Disk Encryption Alex Applegate 1 Overview Common Weak Encryption Stronger Methods Threat From File Encryption Full Disk Encryption (FDE) Threat From FDE 2 Common Types of Weak File Encryption
More informationDelineation of Trivial PGP Security
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 20, Issue 3, Ver. I (May. - June. 2018), PP 17-23 www.iosrjournals.org Delineation of Trivial PGP Security Mr.
More informationCRYPTOGRAPHY. BY, Ayesha Farhin
CRYPTOGRAPHY BY, Ayesha Farhin Overview Introduction Types Advantages n Disadvantages Future Developments Bibliography Introduction Cryptography considered as a branch of both mathematics and computer
More informationP2_L6 Symmetric Encryption Page 1
P2_L6 Symmetric Encryption Page 1 Reference: Computer Security by Stallings and Brown, Chapter 20 Symmetric encryption algorithms are typically block ciphers that take thick size input. In this lesson,
More informationLecture 3: Symmetric Key Encryption
Lecture 3: Symmetric Key Encryption CS996: Modern Cryptography Spring 2007 Nitesh Saxena Outline Symmetric Key Encryption Continued Discussion of Potential Project Topics Project proposal due 02/22/07
More informationSecure Encryption Using Armstrong Number,Color Code ASCII and Prime Number
Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 6 (2017), pp. 1257-1265 Research India Publications http://www.ripublication.com Secure Encryption Using Armstrong Number,Color
More informationLECTURE 4: Cryptography
CSC 519 Information Security LECTURE 4: Cryptography Dr. Esam A. Alwagait alwagait@ksu.edu.sa Recap form previous Lecture We discussed more symmetric encryption. Books? Security Engineering, Ross Anderson
More informationCSc 466/566. Computer Security. 6 : Cryptography Symmetric Key
1/56 CSc 466/566 Computer Security 6 : Cryptography Symmetric Key Version: 2012/02/22 16:14:16 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg
More informationEnhanced 3-D PLAYFAIR Cipher
Enhanced 3-D PLAYFAIR Cipher Anju Bala Research Scholar, DCSA, M.D.U. Rohtak, Haryana (India) anjudeswal.mdu@gmail.com Publishing Date: June 10, 2017 Abstract Cryptography is where security engineering
More informationImplementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
More informationCLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment
CLASSICAL CRYPTOGRAPHY A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY Cryptography is the study of secret (crypto-) writing (-graphy) Concerned with developing algorithms which
More informationCSEC 507: APPLIED CRYPTOLOGY Historical Introduction to Cryptology
CSEC 507: APPLIED CRYPTOLOGY Middle East Technical University Ankara, Turkey Last Modified: December 9, 2015 Created: August 5, 2015 What is Cryptology, Cryptography, and Cryptanalysis? (A Short) Definition
More informationCryptography and Network Security. Saint Leo University. COM 450- Network Defense and Security. Instructor: Dr. Omar.
Saint Leo University COM 450- Network Defense and Security Instructor: Dr. Omar Group members: Ivanna, Tracey, Romario, Chevon March 13, 2018 Abstract This paper will look at different aspects of Cryptography,
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationIntroduction to Symmetric Cryptography
Introduction to Symmetric Cryptography Tingting Chen Cal Poly Pomona 1 Some slides are from Dr. Cliff Zou. www.cs.ucf.edu/~czou/cis3360-12/ch08-cryptoconcepts.ppt Basic Cryptography Private Key Cryptography
More informationChapter 1. Introduction
Chapter 1 Introduction 1.1 CRYPTOGRAPHY Cryptography is an art and science of hiding existing data from the external environment. This is an approach of converting the original message into coded and scrambled
More informationName of chapter & details.
Course Title Course Code Information Security IT707 Theory : 03 Course Credit Practical : 01 Tutorial : 00 Course Learning Outcomes Credits : 04 On the completion of the course, students will be able to:
More informationLecture 2: Secret Key Cryptography
T-79.159 Cryptography and Data Security Lecture 2: Secret Key Cryptography Helger Lipmaa Helsinki University of Technology helger@tcs.hut.fi 1 Reminder: Communication Model Adversary Eve Cipher, Encryption
More informationHardware Design and Software Simulation for Four Classical Cryptosystems
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 21 (2013 ) 500 505 The 4 th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013)
More information18-642: Cryptography 11/15/ Philip Koopman
18-642: Cryptography 11/15/2017 Cryptography Overview Anti-Patterns for Cryptography Using a home-made cryptographic algorithm Using private key when public key is required Not considering key distribution
More informationAn Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security
Journal of Physics: Conference Series PAPER OPEN ACCESS An Implementation of RC4 + Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security To cite this article: M A Budiman et al
More informationInternational Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES
Performance Comparison of Cryptanalysis Techniques over DES Anupam Kumar 1, Aman Kumar 2, Sahil Jain 3, P Kiranmai 4 1,2,3,4 Dept. of Computer Science, MAIT, GGSIP University, Delhi, INDIA Abstract--The
More informationCryptography Worksheet
Cryptography Worksheet People have always been interested in writing secret messages. In ancient times, people had to write secret messages to keep messengers and interceptors from reading their private
More informationKeywords Security, Cryptanalysis, RSA algorithm, Timing Attack
Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard
Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of
More information