CFP last date
20 May 2024
Reseach Article

A Block Cipher Generation Using Color Substitution

by Ravindra Babu Kallam, S. Udaya Kumar, M. Thirupathi Reddy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 28
Year of Publication: 2010
Authors: Ravindra Babu Kallam, S. Udaya Kumar, M. Thirupathi Reddy
10.5120/515-832

Ravindra Babu Kallam, S. Udaya Kumar, M. Thirupathi Reddy . A Block Cipher Generation Using Color Substitution. International Journal of Computer Applications. 1, 28 ( February 2010), 25-27. DOI=10.5120/515-832

@article{ 10.5120/515-832,
author = { Ravindra Babu Kallam, S. Udaya Kumar, M. Thirupathi Reddy },
title = { A Block Cipher Generation Using Color Substitution },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 28 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number28/515-832/ },
doi = { 10.5120/515-832 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:49:19.436288+05:30
%A Ravindra Babu Kallam
%A S. Udaya Kumar
%A M. Thirupathi Reddy
%T A Block Cipher Generation Using Color Substitution
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 28
%P 25-27
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The most powerful and common approach to countering the threats to network / information security is encryption [1]. Even though it is very powerful, the cryptanalysts are very intelligent and they were working day and night to break the ciphers. To make a stronger cipher it is recommended that to use: More stronger and complicated encryption algorithms, Keys with more number of bits (Longer keys), larger block size as input to process, use authentication and confidentiality and secure transmission of keys.

References
  1. Cryptography and Network security by Stallings.
  2. Cryptography and Network security by Stallings" Strengths of DES, EFF-Page Number-100.
  3. Cryptography and Network security by Stallings" Substitution techniques" -Page Number-48.
  4. Cryptography and Network security by Stallings" RSA Scheme" -Page Number-286.
  5. Cryptography and Network security by Stallings" Security attacks-meet in the middle attackbroot force attacks p.n:353, birth day attack-p.n:350"
  6. " for number of colors in the world" www.whyiscolor.org,
  7. " for number of colors in the world" www.jimloy.com
  8. Microsoft visual studio 2008 programming by Jamie
  9. .Net frame work reference by Dan Rahmel
  10. www. Blitzbasic. com / community reference for ARGB color
  11. www. Fileinfo. com / extension / tif (tagged image file format) for tif format
Index Terms

Computer Science
Information Sciences

Keywords

RSA EFF: Electronic frontier foundation PUB: Public key of user B PRA: Private Key of user A PUA: Public key of user A PRB: Private Key of user B PCC: Play color cipher.