CFP last date
20 May 2024
Reseach Article

A Stream Cipher based Bit-Level Symmetric Key Cryptographic Technique using Chen Prime Number

by Sarbajit Manna, Saurabh Dutta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 12
Year of Publication: 2014
Authors: Sarbajit Manna, Saurabh Dutta
10.5120/18802-0328

Sarbajit Manna, Saurabh Dutta . A Stream Cipher based Bit-Level Symmetric Key Cryptographic Technique using Chen Prime Number. International Journal of Computer Applications. 107, 12 ( December 2014), 18-22. DOI=10.5120/18802-0328

@article{ 10.5120/18802-0328,
author = { Sarbajit Manna, Saurabh Dutta },
title = { A Stream Cipher based Bit-Level Symmetric Key Cryptographic Technique using Chen Prime Number },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 12 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 18-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume107/number12/18802-0328/ },
doi = { 10.5120/18802-0328 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:40:52.659647+05:30
%A Sarbajit Manna
%A Saurabh Dutta
%T A Stream Cipher based Bit-Level Symmetric Key Cryptographic Technique using Chen Prime Number
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 12
%P 18-22
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a stream cipher based symmetric key cryptographic technique based on Chen prime number has been proposed. The proposed technique is suitable for encryption and decryption of a large number of files of almost any type. A symmetric key is formed by the sender directly from the plain text using Chen prime number. Then a symmetric key value is derived from the symmetric key which is used to form the cipher text. The symmetric key is sent to the receiver by the sender. The symmetric key value is derived by the receiver from the symmetric key which is used for decryption. To enhance security, focus is to secure the symmetric key value rather than the symmetric key.

References
  1. Saurabh Dutta, "An Approach towards Development of Efficient Encryption Technique", Ph. D. Thesis, The University of North Bengal, 2004.
  2. Ramkrishna Das, Saurabh Dutta, "An Approach of Bit-level Private-key Encryption Scheme based on Armstrong Number and Perfect Number in Selective Mode", Bulletin & Engineering Science (BES), ISSN : 0974- 7176 Vol. 5 No. 1.
  3. http://en. wikipedia. org/wiki/Avalanche_effect
  4. SriramRamanujam and MarimuthuKaruppiah "Designing an algorithm with high Avalanche Effect" IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011.
  5. Manas Paul, Tanmay Bhattacharya, Suvajit Pal, RanitSaha, "A Novel Generic Session Based Bit Level Encryption Technique to Enhance Information Security", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 3, No. 1, 2009.
  6. http://en. m. wikipedia. org/wiki/Chen_prime
  7. Mark Nelson, Jean-Loup Gailly, The Data Compression Book. BPB Publication
  8. Atul Kahate, Cryptography and Network security, Tata McGraw Hill Publishing Company Limited.
  9. William Stallings, Cryptography and Network security: Principles and Practice (Second Edition), Pearson Education Asia, Sixth Indian Reprint 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Chen Prime Number Stream Cipher Symmetric Key Plain Text Cipher Text.