Open Access Open Access  Restricted Access Subscription or Fee Access

Block Based Data Encryption and Decryption Using the Distance between Prime Numbers

Moinak Chowdhury, Dr. Pranam Paul

Abstract


In any communication, security is the most important issue in today’s world. Lots of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research. The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present work focus is enlightening the technique to secure data or message with authenticity and integrity. With the growth of internet and network, the need for secure data transmission become more and more essential and important, as security is a major concern in the internet world [5]-[14]. Data likely to be kept hide from all people except from the authorized user cannot be sent in plain text. So the plain text should be codified by the process of encryption.

Each type of data has its own features; therefore different techniques should be used to protect confidential data from unauthorized access. Here we introduced a new algorithm which is based on simple mathematical operation [6]-[11]-[12]. In this algorithm encryption is done on binary file so it can be applicable for any type of data such a text as well as multimedia data. Here the same idea of cryptography is working (i.e. using key, conversion of plain text into cipher text called encryption and the Reverse, means cipher text to plain text called decryption) [1]-[3].


Keywords


Cryptography, Cipher Text, Decryption, Encryption, Plain Text, Symmetric Key.

Full Text:

PDF

References


Pranam Paul, Saurabh Dutta, A K Bhattacharjee,”An Approach to ensure Security through Bit-level Encryption with Possible Lossless Compression”, International Journal of Computer Science and Network Security”, Vol. 08, No. 2, pp. 291 – 299, 2008.

Sanjit Mazumdar, Sujay Dasgupta, Prof.(Dr) PranamPaul,”Implementation of Block based Encryption at Bit-Level”, International journal of Computer Science and Network Security, Vol. 11, No.2, pp. 18-23, 2011.

Sujay Dasgupta, Sanjit Mazumdar, Prof.(Dr) Pranam paul,“Implementation of Information Security based on CommonDivison”, International journal of Computer Science and Network Security, Vol. 11, No.2,pp. 51-53, 2011.

Asoke Nath, Saima Ghosh, Meheboob AlamMallik,”Symmetric Key Cryptography using Random key Generator”, Proceeding of International conference on security and management(SAM’10” held at Las Vegas, USA Jull 12-15,2010), P-Vol-2, pp. 239-244,2010.

Pranam Paul, Saurabh Dutta, “An Enhancement of Information Security using Substitution of Bits through Prime Detection in Blocks”, Proceeding of National Conference on Recent Trends in information Systems(ReTIS-06), Organized by IEEE Gold Affinity Group, IEEE Calcutta Section, Computer Science & Engineering Department, CMATER & SRUVM Project-Jadavpur University and Computer Jagat.

Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta, Asoke Nath, “A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm”, International Conference on Communication Systems and Network Technologies, 978-0-7695-4437.

Pranam Paul, Saurabh Dutta, “An Enhancement of Information Security using Substitution of Bits Through Prime Detection in Blocks”, Proceeding of National Conference on Recent Trends in information Systems(ReTIS-06), Organized by IEEE Gold Affinity Group, IEEE Calcutta Section, Computer Science & Engineering Department, CMATER &SRUVM Project-Jadavpur University and Computer Jagat.

Oded Goldreich, “Foundation of Cryptography (A primer)”, July 2004.

Bruce Schneier, “Applied Cryptography”, ISBN 0-471-12845-7

John Talbot, Dominic Welsh; “Complexity and Cryptography An introduction”. ISBN-10: 0521852315

Denise Sutherland, Mark Koltko-Rivera “Cracking Codes and Cryptograms for Dummies”, ISBN: 978-0-470-59100-0; October 2009

Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone “Handbook of Applied Cryptography”; CRC Press; ISBN: 0-8493-8523-7

WILLIAM 'F. FRIEDMAN; “MILITARY CRYPTANALYSIS, Pa:r.t I, MONOALPHABETIC SUBSTITUTION SYSTEMS”

Henk C.A. van Tilborg, Sushil Jajodia; “Encyclopedia of Cryptography and Security”, 2nd edition; 2011; ISBN: 144195905X

Wenbo Mao; “Modern Cryptograph”.

Wels Chenbach; “Cryptography in C and C++”.

Mathematics Across Cultures: The History of Non-Western Mathematics.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.