Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A non-feistel Symmetric Key Encryption Algorithm.
Author(s):
1. Raza Ali: University of Engineering & Technology (UET), Lahore, Pakistan
2. Muhammad Ali: University of Engineering & Technology (UET), Lahore, Pakistan
Abstract:
- Network security is the primary element to secure a communication network, and if an intruder still able to break this security element, the other and an important element is data encryption which hides the intelligence of data so that other than authorized entities cannot understand the encrypted data. This paper proposed a new shared key, block cipher encryption/decryption algorithm. The algorithm is designed keeping the features of non fiestel cipher and counter mode of block cipher is used in the algorithm. The encryption process starts by entering a key and counter value which is 128bit long. From the 128-bit of key, decimal value is calculated and added between two counter values to make counter value 128-bit. To encrypt data, 128-bit key is used along with counter value. This new algorithm encrypts 128-bit plaintext block and produces 128-bit cipher text block using several encryption elements including matrix transposition, adding average value, key based bitwise transposition operation, and byte substitution. The algorithm is designed for secure communication applications. For the analysis of proposed algorithm different cryptanalysis techniques such as frequency attack, avalanche effect, throughput time and brute force attack are used, and the design is useful in terms of privacy, data confidentiality. The unique combination of encryption elements obscures the relationship between plaintext and cipher text.
Page(s): 2-8
DOI: DOI not available
Published: Journal: Bahria University Journal of Information & Communication Technologies, Volume: 10, Issue: 2, Year: 2017
Keywords:
Keywords are not available for this article.
References:
[1] B.Schneier, November 1995., -
[2] A.Nadeem,M. Y.Javed, 2005.ICICT 2005,in Information and Communication Technologies 84 -89
[3] V. M. V. S.Sudha,K.Brindha,L.Agilandeeswari, July 2012."Implementation of Enhanced Data Encryption Standard on MANET with less energy consumption through limited computation,",In Proceeding of International Journal of Engineering Research and Development 2 46 -52
[4] Xin Zhou, Xiaofei Tang, Research and Implementation of RSA Algorithm for Encryption and Decryption, 2011 the 6th International Forum on Strategic Technology.
[5] YANGXiao-guang, September 2004.,Analysis about ECC Algorithm and Program Realization[J] 3 13 -16
[6] B. A.Forouzan,McGraw-Hill, 2008., -
[7] C.Lanxiang,Z.Shuming,-, 2010."The comparisons between public key and symmetric key cryptography in protecting storage systems," in Computer Application and System Modeling (ICCASM, V4 -
[8] Security of AES against brute force attack,id=1279619 (Accessed: 12 October -
[9] “Floating-Point Operation, 2014.,October -
[10] “FrequencyAnalysis, 2014.,(Accessed: 8 October -
Citations
Citations are not available for this document.
0

Citations

0

Downloads

16

Views