Open Access Open Access  Restricted Access Subscription or Fee Access

Block Cipher Encryption based on Random Substitution

Amit Roy, Dr. Pranam Paul

Abstract


Securing data is essential, whether it is in commercial or armature environment. Exchanging data over the network is risky due to illegitimate access and possible modification during communication. Certain attacks on data/message may take place. To minimize these problems, there are several techniques has been invented.

To secure data, primarily some cryptic techniques are used. In ancient times different types of substitution techniques were used, later on some mathematical models [2] [6] were devised to encrypt and decrypt the data. In present days both of those techniques are combined to achieve solutions associated with those problems. In our work we have used the combined technique. We have used substitutions to make the data random, to enable this task we have used the values comprises the keys then performed XOR operations using modified data (after substitution) and keys. The whole process is capable to encrypt and decrypt a file.


Keywords


Secure, Data, Network, Risk, Attacks, Cryptic, Substitution, Encrypt, Decrypt, Mathematical Models.

Full Text:

PDF

References


William Stallings,”Cryptography and Network Security Principles and Practices”, 4th edition, Pearson Education, Inc., publishing as Prentice Hal, 2006.

Bruce Schneier, “Applied Cryptography”, ISBN 0-471-12845-7

Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone “Handbook of Applied Cryptography”; CRC Press; ISBN: 0-8493-8523-7

Pranam Paul, Saurabh Dutta, A K Bhattacharjee,”An Approach to ensure Security through Bit-level Encryption with Possible Lossless Compression”, International Journal of Computer Science and Network Security”, Vol. 08, No. 2, pp. 291 – 299, 2008.

Asoke Nath, Saima Ghosh, Meheboob Alam Mallik, ”Symmetric Key Cryptography using Random key Generator”, Proceeding of International conference on security and management(SAM’10” held at Las Vegas, USA Jull 12-15,2010), P-Vol-2, pp. 239-244,2010.

Oded Goldreich, “Foundations of Cryptography (A primer)”, July 2004.

John Talbot, Dominic Welsh; “Complexity and Cryptography An introduction”. ISBN-10: 0521852315

Denise Sutherland, Mark Koltko-Rivera “Cracking Codes and Cryptograms For Dummies”,; ISBN: 978-0-470-59100-0;October 2009

Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone “Handbook of Applied Cryptography”; CRC Press; ISBN: 0-8493-8523-7

WILLIAM 'F. FRIEDMAN; “MILITARY CRYPTANALYSIS, Part I, MONOALPHABETIC SUBSTITUTION SYSTEMS”

Henk C.A. van Tilborg, Sushil Jajodia; “Encyclopedia of Cryptography and Security”, 2nd edition; 2011; ISBN: 144195905X

Mao, Wenbo. Modern Cryptography. Upper Saddle River, NJ: Prentice Hall PTR, 2004. Print.

Forouzan, Behrouz A. Introduction to Cryptography and Network Security. Boston: McGraw-Hill Higher Education, 2008. Print.

CARR, JAMES G. The Law of Electronic Surveillance. 2 vols. Deerfield, Ill.: Clark, Boardman, and Callaghan, 1998.

FISHMAN, CLIFFORD S. Wiretapping and Eavesdropping. Rochester, N.Y.: Lawyers Cooperative Pub. Co., 1978.

Erdogmus, Nesli, and S'ebastien Marcel. 'Spoofing Attacks To 2D Face Recognition Systems With 3D Masks'. 2013. Print.

Khan, Abdul Nasir, Kalim Qureshi, and Sumair Khan. 'Enhanced Switched Network Sniffer Detection Technique Based On IP Packet Routing'. Information Security Journal: A Global Perspective 18.4 (2009): 153-162. Web.

Tao, Ran et al. 'A Host-Based Intrusion Detection System Using Architectural Features To Improve Sophisticated Denial-Of-Service Attack Detections'. International Journal of Information Security and Privacy 4.1 (2010): 18-31. Web.

Salem, Malek Ben, and Salvatore J. Stolfo. 'A Comparison of One-Class Bag-Of-Words User Behavior Modeling Techniques for Masquerade Detection'. Security Comm. Networks 5.8 (2011): 863-872. Web.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.