Open Access Open Access  Restricted Access Subscription or Fee Access

Block based Cryptographic Protocol with Arithmetic Operations

Rajat Kumar Das, Dr. Pranam Paul

Abstract


In todays world for any kind of communication, security is the most important thing. There are huge number of data security and data hiding algorithms have been developed in the last decade, which worked as motivation for the research.

This present work focus in technique to secure data or message with authenticity. With the growth of worldwide communicational network and internet, the necessity for secure data transfer become more and more essential and important, as security of data is a major concern in todays internet world. Data must be kept in hidden form from the unauthorised user or any kind of hacker attack, so we need to make our data safe and secure by implementing more secure encryption technique.

Every kind of data has its own characteristics, so we need different kind of encryption techniques to make secure our data. In this algorithm we are introducing a new kind of techniques using simple arithmetics operations.


Keywords


Cryptography, Cipher Text Decryption, Encryption, Plain Text, Symmetric Key.

Full Text:

PDF

References


William Stallings, ”Cryptography and network security principles and practices”, 4th edition, Pearson Education, Inc., publishing as Prentice Hal, 2006.

Pranam Paul, Saurabh Dutta, A K Bhattacharjee,”An Approach to ensure Security through Bit-level Encryption with Possible Lossless Compression”, International Journal of Computer Science and Network Security”, Vol. 08, No. 2, pp. 291 – 299, 2008.

Sanjit Mazumdar, Sujay Dasgupta, Prof.(Dr) PranamPaul, ”Implementation of Block based Encryption at Bit-Level”, International journal of Computer Science and Network Security, Vol. 11, No.2, pp. 18-23, 2011.

Sujay Dasgupta, Sanjit Mazumdar, Prof.(Dr) Pranampaul, “Implementation of Information Security based on Common Divison”, International journal of Computer Science and Network Security, Vol. 11, No.2,pp. 51-53, 2011.

http://en.wikipedia.org/wiki/Symmet ric-key_algorithm

AsokeNath, Saima Ghosh, Meheboob Alam Mallik, ”Symmetric Key Cryptography using Random keyGenerator”, Proceeding of International conference on security and management(SAM’10” held at Las Vegas, USA Jull 12-15,2010), P-Vol-2, pp. 239-244,2010.

Pranam Paul, Saurabh Dutta, “An Enhancement of Information Security using Substitution of Bits Through PrimeDetection in Blocks”, Proceeding of National Conference onRecent Trends in information Systems(ReTIS-06), Organized by IEEE Gold Affinity Group, IEEE Calcutta Section, Computer Science & Engineering Department, CMATER &SRUVM Project-Jadavpur University and Computer Jagat.

Oded Goldreich, “Foundation of Cryptography (A primer)”, July 2004.

Bruce Schneier, “Applied Cryptography”, ISBN 0-471-12845-7

John Talbot, Dominic Welsh; “Complexity and Cryptography An introduction”. ISBN-10: 0521852315

Denise Sutherland, Mark Koltko-Rivera “Cracking Codes and Cryptograms For Dummies”,; ISBN: 978-0-470-59100-0;October 2009

Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone “Handbook of Applied Cryptography”; CRC Press; ISBN: 0-8493-8523-7

WILLIAM 'F. FRIEDMAN; “MILITARY CRYPTANALYSIS, Pa:r.t I, MONOALPHABETIC SUBSTITUTION SYSTEMS”

Henk C.A. van Tilborg, Sushil Jajodia; “Encyclopedia of Cryptography and Security”, 2nd edition; 2011; ISBN: 144195905X

Wenbo Mao; “Modern Cryptograph”..

Wels Chenbach; “Cryptography in C and C++”.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.