Symmetric key cryptography using digital circuit based on one right shift

Symmetric key cryptography using digital circuit based on one right shift

Joyita Goswami (Ghosh) Manas Paul 

Institute of Leadership Entrepreneurship & Development, Kolkata 700010, India

Corresponding Author Email: 
joyitagoswami@gmail.com
Page: 
57-61
|
DOI: 
10.18280/rces.040203
Received: 
|
Accepted: 
|
Published: 
30 June 2017
| Citation

OPEN ACCESS

Abstract: 

A session based symmetric key cryptographic technique has been proposed in this paper and it is termed as 1RS. The plain text is considered as a stream of bits and is chopped into variable length blocks. Bit positions into the block are right shifted to generate the cipher text. Right shift means the bit is right shifted by one position. The data bit is set or reset depending on the previous bit. The MSB is initialized by reset condition. A session key is generated randomly from the chopping information of plain text.  Results are generated using twenty files of twelve different types with varying file sizes. Analyzing the results with respect to different parameters, the proposed technique 1RS is compared with existing and industrially accepted symmetric key techniques Triple-DES (168bits) and AES (128 bits).

Keywords: 

1RS, AES, Triple DES, Session Key, Chi-square

1. Introduction
2. Technique
3. Algorithms
4. Example
5. Results
6. Conclusion
Acknowledgement
  References

[1] Mandal B.K., Bhattacharyya D., Bandyopadhyay S.K. (2013). Designing and performance analysis of a proposed symmetric cryptography algorithm, International Conference on Communication Systems and Network Technologies (CSNT 2013), Gwalior, pp. 453-461.

[2] Paul M., Mandal J.K. (2013). A novel generic session based bit level cryptographic technique based on magic square concepts, International Conference on Global Innovations in Technology and Sciences (ICGITS 2013), Kottayam, pp. 156-163.

[3] Niemiec M., Machowski L. (2012). A new symmetric block cipher based on key-dependent S-boxes, 4th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2012), St. Petersburg, pp. 474-478.

[4] Cheng H., Ding Q. (2012). Overview of the block cipher, Second International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC 2012), Harbin, pp. 1628-1631.

[5] Paul M., Mandal J.K. (2012). A universal session based bit level symmetric key cryptographic technique to enhance the information security, International Journal of Network Security & Its Application (IJNSA), Vol. 4, No. 4, pp. 123-136.

[6] Navin A.H., Oskuei A.R., Khashandarag A.S., Mirnia M. (2011). A novel approach cryptography by using residue number system, 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2011), Seogwipo, pp. 636-639.

[7] Paul M., Mandal J.K. (2011). A novel generic session based bit level cryptographic technique to enhance information security, International Journal of Computer Science and Network Security (IJCSNS), Vol. 11, No. 12, pp. 117-122.

[8] Som S., Chatergee N.S., Mandal J.K. (2011). Key based bit level genetic cryptographic technique (KBGCT), 7th International Conference on Information Assurance and Security (IAS), Melaka, pp. 240-245.

[9] Triple Data Encryption Standard. (1999). FIPS PUB 46-3 Federal Information Processing Standards Publication, Reaffirmed, Department Of Commerce/National Institute of Standards and Technology.