Open Access Open Access  Restricted Access Subscription or Fee Access

An Approach to Block Ciphering Using Root of Perfect Square Number

Shibaranjan Bhattacharyya, Dr. Pranam Paul

Abstract


In recent days, for secure information transmission through internet, Cryptography is used. Here for secure data communication the plain text would be encrypted into cipher text using encryption process. This encrypted text along with the key or information would be send by the sender at receiver’s end. Then using the key or information, the receiver would able to decrypt the encrypted text. Using this base idea there exist different algorithm for encryption and decryption and for key generation. Here the main concept of the algorithm comes from cryptography, to secure any kind of file as it is implemented on bit-level. The strength of the technique is analyzed in this paper. This is a block based private key cryptographic technique. Here the main idea is developed on the basis of finding the number which appears maximum time and replace all the numbers with another numbers with the help of suitable technique which is described in the algorithm section. Then there also exist another technique which is based on finding root of the closest smaller perfect square. It can be possible that after encryption the encrypted file size can be reduced compared to the original file size. In case of encrypted file size reduced, lossless compression added extra flavour to it. The encryption and decryption process is clearly described in the algorithm section.


Keywords


Cryptography, Encryption, Decryption, Cipher, Private Key, Symmetric Key, Plain Text, Network Security.

Full Text:

PDF

References


William Stallings, “Cryptography and network security principles and practices”, 4th edition, Pearson Education, Inc., publishing as Prentice Hal, 2006.

Pranam Paul, Saurabh Dutta, A K Bhattacharjee, ”An Approach to ensure Security through Bit-level Encryption with Possible Lossless Compression”, International Journal of Computer Science and Network Security”, Vol. 08, No. 2, pp. 291 – 299, 2008.

Sanjit Mazumdar, Sujay Dasgupta, Prof.(Dr.) Pranam Paul, ”Implementation of Block based Encryption at Bit-Level”, International journal of Computer Science and Network Security, Vol. 11, No.2, pp. 18-23, 2011.

Sujay Dasgupta, Sanjit Mazumdar, Prof. (Dr.) Pranam Paul, “Implementation of Information Security based on Common Divison”, International journal of Computer Science and Network Security, Vol. 11, No.2,pp. 51-53, 2011.

http://en.wikipedia.org/wiki/Symmetric-key_algorithm

Asoke Nath, Saima Ghosh, Meheboob Alam Mallik, ”Symmetric Key Cryptography using Random key Generator”, Proceeding of International conference on security and management(SAM’10” held at Las Vegas, USA Jull 12-15,2010), P-Vol-2, pp. 239-244,2010.

Pranam Paul, Saurabh Dutta, “An Enhancement of Information Security using Substitution of Bits Through Prime Detection in Blocks”, Proceeding of National Conference on Recent Trends in information Systems(ReTIS-06), Organized by IEEE Gold Affinity Group, IEEE Calcutta Section, Computer Science & Engineering Department, CMATER &SRUVM Project-Jadavpur University and Computer Jagat.

Oded Goldreich, “Foundation of Cryptography (A primer)”, July 2004.

Bruce Schneier, “Applied Cryptography”, ISBN 0-471-12845-7

John Talbot, Dominic Welsh; “Complexity and Cryptography An introduction”. ISBN-10: 0521852315

Denise Sutherland, Mark Koltko-Rivera “Cracking Codes and Cryptograms For Dummies”,; ISBN: 978-0-470-59100-0;October 2009

Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone “Handbook of Applied Cryptography”; CRC Press; ISBN: 0-8493-8523-7

WILLIAM 'F. FRIEDMAN; “MILITARY CRYPTANALYSIS, Pa:r.t I, MONOALPHABETIC SUBSTITUTION SYSTEMS”

Henk C.A. van Tilborg, Sushil Jajodia; “Encyclopedia of Cryptography and Security”, 2nd edition; 2011; ISBN: 144195905X

Wenbo Mao; “Modern Cryptograph”..

Wels Chenbach; “Cryptography in C and C++”.

Prof. (Dr.) Pranam Paul,“An Application to ensure Security through Bit-level Encryption”, IJCSNS International Journal of Computer Science and Network Security, Vol. 9, No.11, 2009.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.