CFP last date
20 May 2024
Reseach Article

A Novel Multiple Key Block Ciphering Mechanism with Reduced Computational Overhead

by V.S.Shankar Sriram, Abhishek Kumar Maurya, G.Sahoo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 17
Year of Publication: 2010
Authors: V.S.Shankar Sriram, Abhishek Kumar Maurya, G.Sahoo
10.5120/367-554

V.S.Shankar Sriram, Abhishek Kumar Maurya, G.Sahoo . A Novel Multiple Key Block Ciphering Mechanism with Reduced Computational Overhead. International Journal of Computer Applications. 1, 17 ( February 2010), 25-30. DOI=10.5120/367-554

@article{ 10.5120/367-554,
author = { V.S.Shankar Sriram, Abhishek Kumar Maurya, G.Sahoo },
title = { A Novel Multiple Key Block Ciphering Mechanism with Reduced Computational Overhead },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 17 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 25-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number17/367-554/ },
doi = { 10.5120/367-554 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:42:53.771552+05:30
%A V.S.Shankar Sriram
%A Abhishek Kumar Maurya
%A G.Sahoo
%T A Novel Multiple Key Block Ciphering Mechanism with Reduced Computational Overhead
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 17
%P 25-30
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptanalysis of symmetric key cryptography encourages large key size and complex operations to achieve message confidentiality. All these techniques pose computational overhead at both the sender & receiver ends. In this paper, we propose a simple yet powerful Block Cipher Multiple Key Symmetric Encryption (BCMKSE) algorithm for achieving both confidentiality & integrity with reduced computational and message overheads. Our algorithm changes the key after encrypting/decrypting a piece of the whole message. While the key changes during the whole message encryption/decryption process without increasing network traffic or message overhead. This methodology becomes faster as it uses the simplest operations like shift, XOR, addition and comparison operations.

References
  1. Wikipedia Symmetric key algorithm. Updated February, 2007. http://en.wikipedia.org/wiki/Symmetric_key_algorithm (March, 2009).
  2. H W. Stallings. Cryptography and Network Security: Principles and Practice, 3rd Edition. Prentice Hall, New Jersey, USA, 2003.
  3. FIPS Publication 46-3, "Data Encryption Standard (DES)." U.S. DoC/NIST, October 25, 1999.
  4. American National Standard for Financial Services X9.52-1998, "Triple Data Encryption Algorithm Modes of Operation." American Bankers Association, Washington, D.C., July 29, 1998.
  5. FIPS Publication 197, "Advanced Encryption Standard (AES)." U.S. DoC/NIST, November 26, 2001.
  6. Wikipedia Advanced Encryption Standard. Updated February, 2007. http://en.wikipedia.org/wiki/Advanced_Encryption_Standard (March, 2009).
  7. B. Schneier, Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish) Fast Software Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag, 1994.
  8. B. Schneier, Applied Cryptography, John Wiley & Sons, New York, 1994.
  9. Menezes, P. van Oorschot, and S. Vanstone, "Handbook of Applied Cryptography." CRC Press, New York, 1997.
  10. GridCrypt: High Performance Symmetric Key Cryptography using Enterprise Grids by Agus Setiawan, David Adiutama, Julius Liman, Akshay Luther and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory Dept. of Computer Science and Software Engineering The University of Melbourne, Australia.
  11. Performance of the AES Candidate Algorithms in Java by Andreas Sterbenz, Peter Lipp Institute for Applied Information Processing and Communications Graz, University of Technology Inffeldgasse 16, A-8010 Graz, Austria.
Index Terms

Computer Science
Information Sciences

Keywords

Block Cipher Confidentiality Cryptography Message Integrity Symmetric Key