CFP last date
20 March 2024
Reseach Article

Bit and Byte Level Generalized Modified Vernam Cipher Method with Feedback

by Prabal Banerjee, Asoke Nath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 2
Year of Publication: 2013
Authors: Prabal Banerjee, Asoke Nath
10.5120/10604-5310

Prabal Banerjee, Asoke Nath . Bit and Byte Level Generalized Modified Vernam Cipher Method with Feedback. International Journal of Computer Applications. 64, 2 ( February 2013), 9-15. DOI=10.5120/10604-5310

@article{ 10.5120/10604-5310,
author = { Prabal Banerjee, Asoke Nath },
title = { Bit and Byte Level Generalized Modified Vernam Cipher Method with Feedback },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 2 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number2/10604-5310/ },
doi = { 10.5120/10604-5310 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:19.931085+05:30
%A Prabal Banerjee
%A Asoke Nath
%T Bit and Byte Level Generalized Modified Vernam Cipher Method with Feedback
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 2
%P 9-15
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the present paper the authors have introduced a new symmetric key cryptographic method where they have clubbed both bit level and byte level generalized modified vernam cipher method with feedback. Nath et al already developed methods bit level encryption standard(BLES) Ver-I and Ver-II where they have used extensive bit level permutation, bit exchange, bit xor and bit shift encryption method. Nath et al also developed a method bit level generalised vernam cipher method. In the present study the authors have used both bit level generalized vernam cipher method and after that byte level vernam cipher method using feedback. Due to introduction of feedback in both bit level as well as byte level vernam cipher method the common attacks such as differential attack or known plain text attack is not applicable in the present method. In the present paper the authors have used random key generator to construct the keypad for vernam cipher method. The authors have introduced a special bit manipulation method so the encryption algorithm will work even for all characters with ASCII Code 0 or all characters with ASCII Code 255. The most of the standard algorithm will fail to encrypt a file where all characters are ASCII '0' or all characters with ASCII '255' where as the present method will be able to encrypt a file where all characters are ASCII '0' or all characters are ASCII '255'. The present method will be effective for encrypting short message, password, confidential key etc.

References
  1. Symmetric Key Cryptography using Random Key generator: Asoke Nath, Saima Ghosh, Meheboob Alam Mallik: "Proceedings of International conference on security and management(SAM '10)" held at Las Vegas, USA July 12-15, 2010), Vol-2, Page: 239-244(2010).
  2. Advanced Symmetric key Cryptography using extended MSA method: DJSSA symmetric key algorithm: Dripto Chatterjee, Joyshree Nath, Soumitra Mondal, Suvadeep Dasgupta and Asoke Nath, Jounal of Computing, Vol 3, Issue-2, Page 66-71,Feb(2011).
  3. A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm, Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta and Asoke Nath : Proceedings of IEEE International Conference on Communication Systems and Network Technologies, held at SMVDU(Jammu) 03-06 June,2011, Page-89-94(2011).
  4. New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm: Neeraj Khanna, Joel James,Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti and Asoke Nath : Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130(2011).
  5. Symmetric key Cryptography using modified DJSSA symmetric key algorithm, Dripto Chatterjee, Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath, Proceedings of International conference Worldcomp 2011 held at Las Vegas 18-21 July 2011, Page-306-311, Vol-1(2011).
  6. An Integrated symmetric key cryptography algorithm using generalized vernam cipher method and DJSA method: DJMNA symmetric key algorithm: Debanjan Das, Joyshree Nath, Megholova Mukherjee, Neha Chaudhury and Asoke Nath: Proceedings of IEEE International conference: World Congress WICT-2011 held at Mumbai University 11-14 Dec, 2011, Page No. 1203-1208(2011).
  7. Symmetric key cryptosystem using combined cryptographic algorithms- generalized modified vernam cipher method, MSA method and NJJSAA method: TTJSA algorithm – Trisha Chatterjee, Tamodeep Das, Joyshree Nath, Shayan Dey and Asoke Nath, Proceedings of IEEE International conference: World Congress WICT-2011 t held at Mumbai University 11-14 Dec, 2011, Page No. 1179-1184(2011).
  8. Symmetric key Cryptography using two-way updated Generalized Vernam Cipher method: TTSJA algorithm, International Journal of Computer Applications (IJCA, USA), Vol 42, No. 1, March, Pg: 34 -39( 2012).
  9. Ultra Encryption Standard(UES) Version-I: Symmetric Key Cryptosystem using generalized modified Vernam Cipher method, Permutation method and Columnar Transposition method, Satyaki Roy, Navajit Maitra, Joyshree Nath,Shalabh Agarwal and Asoke Nath, Proceedings of IEEE sponsored National Conference on Recent Advances in Communication, Control and Computing Technology -RACCCT 2012, 29-30 March held at Surat, Page 81-88(2012).
  10. An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm, Adbvanced Caeser Cipher Algorithm, Bit Rotation and reversal Method: SJA Algorithm. , International Journal of Modern Education and Computer Science, Somdip Dey, Joyshree Nath, Asoke Nath,(IJMECS), ISSN: 2075-0161 (Print), ISSN: 2075-017X (Online), Vol-4, No-5, Page 1-9,2012.
  11. An Advanced Combined Symmetric Key Cryptographic Method using Bit manipulation, Bit Reversal, Modified Caeser Cipher(SD-REE), DJSA method, TTJSA method: SJA-I Algorithm, Somdip dey, Joyshree Nath, Asoke Nath, International Journal of Computer Applications(IJCA 0975-8887, USA), Vol. 46, No. 20, Page- 46-53,May, 2012.
  12. Ultra Encryption Standard(UES) Version-IV: New Symmetric Key Cryptosystem with bit-level columnar Transposition and Reshuffling of Bits, Satyaki Roy, Navajit Maitra, Joyshree Nath, Shalabh Agarwal and Asoke Nath, International Journal of Computer Applications(IJCA)(0975-8887) USA Volume 51-No. 1. ,Aug, Page. 28-35(2012)
  13. Bit Level Encryption Standard(BLES) : Version-I, Neeraj Khanna, Dripto Chatterjee, Joyshree Nath and Asoke Nath, International Journal of Computer Applications(IJCA)(0975-8887) USA Volume 52-No. 2. ,Aug, Page. 41-46(2012).
  14. Bit Level Generalized Modified Vernam Cipher Method with Feedback, Prabal Banerjee, Asoke Nath, Proceedings of International Conference on Emerging Trends and Technologies held at Indore, Dec 15-16,2012.
  15. Cryptography and Network Security, William Stallings, Prentice Hall of India.
Index Terms

Computer Science
Information Sciences

Keywords

generalized vernam cipher method bit exchange random key feedback differential attack