A New Encryption Algorithm Using Symmetric Key Cryptography

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Cryptographic techniques are primarily divided into two categories and they are: Symmetric key type and Asymmetric key type. In Symmetric key cryptography, during the process of encryption and decryption, the same key will be used. This is a conventional method of Cryptography. This might cause some disadvantage and give way for attacks on the algorithm. So, for this reason, the next technique comes into play. In Asymmetric key cryptography, there is a usage of a pair of keys, one for the encryption process and another for decryption process. In this technique also, there is a slight disadvantage, since there is a possibility for attackers to guess the public key from the pair of keys, thereby posing a threat to the process to an extent. In this paper, we develop an algorithm with a simple yet efficient structure using Symmetric key cryptography that could possibly decrease the chance of attacks on the algorithm.

     

     


  • Keywords


    Cryptography, Security, Algorithm design.

  • References


      [1] Dudhatra Nilesh, Malti Nagle. The new cryptography algorithm with high throughput, 2014 International Conference on Computer Communication and Informatics, 2014

      [2] William Stallings, ''Cryptography and Network Security 5th Edition,'' Prentice Hall, 2005,PP. 58-309 .

      [3] Jaeyoung Yi. Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm , Lecture Notes in Computer Science, 2009

      [4] Ceccarelli, A. Bondavalli, F. Brancati,and E. La Mattina, “Improving Security of Internet Services through Continuous and Transparent User Identity Verification,” Proc. Int’l Symp. Reliable Distributed Systems (SRDS), pp. 201-206, Oct. 2012.

      [5] W.E.Burr, Selecting the Advanced Encryption Standard, IEEE Security & Privacy, pp. 43-52, 2003.

      [6] Bruce Schneier. The Blowfish Encryption Algorithm Retrieved October 25, 2008, http://www.schneier.com/blowfish.html

      [7] D. S. Abdul, H. M. Abdul Kader, M. M. Hadhoud, Perfor-mance Evaluation of Symmetric Encryption Algorithms, Commu-nications of the IBIMA, vol. 8, pp. 58-64, 2009.

      [8] Hardjono, ''Security In Wireless LANS And MANS,'' Artech House Publishers 2005.

      [9] Results of comparing tens of encryption algorithms using dif-ferent settings- Crypto++ benchmark- . Retrieved October 1, 2008, from: http://www.eskimo.com/~weidai/benchmarks.html

      [10] Ruangchaijatupon, P.Krishnamurthy, ''Encryption and Power Consumption in Wireless LANs-N,’’ The Third IEEE Workshop on Wireless LANs - September 27-28, 2001- Newton, Massachu-setts.

      [11] S.Pavithra, Mrs. E. Ramadevi “STUDY AND PERFOR-MANCE ANALYSIS OF CRYPTOGRAPHY ALGORITHMS ” International Journal of Advanced Research in Computer Engineer-ing & Technology Volume 1, Issue 5, July 2012 14, pp.82-86


 

View

Download

Article ID: 15734
 
DOI: 10.14419/ijet.v7i2.32.15734




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.