Open Access  Subscription or Fee Access

### Cryptographic Algorithm Based on Triangular Form

Subhankar Ghosh, Dr. Pranam Paul

#### Abstract

Cryptography is the automated (or algorithmic) method in which security goals are accomplished. Typically, when we say “cryptographic algorithm” we are discussing an algorithm meant to be executed on a computer [6]-[9].These algorithms operate the messages in the form of groups of bits.

Here we introduced a Block based symmetric key encryption and decryption algorithm [5]-[11].

The idea is developed on the basis to remember Pauli’s exclusion principle.

That is we know the number of orbit came as: 1s 2s2p 3s 3p 3d 4f 4p 4d 4s

But the electron enter to the orbit in the Following manner:

1s 2s2p 3s 3p 4f 3d 4p 4d 4s

That is the trick of our algorithm and our Key can be choose any random number, which defines the number of row of that Triangle.

#### Keywords

Cipher Text, Cryptography, Encryption, Decryption, Plain Text, Symmetric Key

PDF

#### References

Bruce Schneier, “Applied Cryptography”, ISBN 0-471-12845-7

Sanjit Mazumdar, Sujay Dasgupta, Prof. (Dr) Pranam Paul, ”Implementation of Block based Encryption at Bit-Level”, International journal of Computer Science and Network Security, Vol. 11, No.2, pp. 18-23, 2011.

Oded Goldreich, “Foundation of Cryptography (A primer)”, July 2004.

Wenbo Mao; “Modern Cryptograph”..

http://en.wikipedia.org/wiki/Symmetric-key_algorithm

Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone “Handbook of Applied Cryptography”; CRC Press; ISBN: 0-8493-8523-7

WILLIAM 'F. FRIEDMAN; “MILITARY CRYPTANALYSIS, Pa:r.t I, MONOALPHABETIC SUBSTITUTION SYSTEMS”

Pranam Paul, Saurabh Dutta, A K Bhattacharjee, ”An Approach to ensure Security through Bit-level Encryption with Possible Lossless Compression”, International Journal of Computer Science and Network Security”, Vol. 08, No. 2, pp.291 – 299, 2008.

William Stallings,”Cryptography and network security principles and practices”, 4th edition, Pearson Education, Inc. Publishing as Prentice Hal, 2006.

John Talbot, Dominic Welsh; “Complexity and Cryptography An introduction”. ISBN-10: 0521852315

Denise Sutherland, Mark Koltko-Rivera “Cracking Codes and Cryptograms For Dummies”,; ISBN: 978-0-470-59100-0; October 2009

SujayDasgupta, SanjitMazumdar, Prof. (Dr) Pranam paul, “Implementation of Information Security based on Common Divison”, International journal of Computer Science and Network Security, Vol. 11, No.2,pp. 51-53, 2011.

Pranam Paul, Saurabh Dutta, “An Enhancement of Information Security using Substitution of Bits Through Prime Detection in Blocks”, Proceeding of National Conference on Recent Trends in information Systems(ReTIS-06), Organized by IEEE Gold Affinity Group, IEEE Calcutta Section, Computer Science & Engineering Department, CMATER &SRUVM Project-Jadavpur University and Computer Jagat.

Henk C.A. van Tilborg, SushilJajodia; “Encyclopedia of Cryptography and Security”, 2nd edition; 2011; ISBN: 144195905X

AsokeNath, Saima Ghosh, MeheboobAlamMallik, ”Symmetric Key Cryptography using Random key Generator”, Proceeding of International conference on security and management(SAM’10” held at Las Vegas, USA Jull 12-15,2010), P-Vol-2, pp. 239-244,2010.

Wels Chenbach; “Cryptography in C and C++”.

### Refbacks

• There are currently no refbacks.