Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A New Method for Symmetric Key Cryptography

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
B. Nagaraju, P. Ramkumar
10.5120/ijca2016909888

B Nagaraju and P Ramkumar. A New Method for Symmetric Key Cryptography. International Journal of Computer Applications 142(8):36-39, May 2016. BibTeX

@article{10.5120/ijca2016909888,
	author = {B. Nagaraju and P. Ramkumar},
	title = {A New Method for Symmetric Key Cryptography},
	journal = {International Journal of Computer Applications},
	issue_date = {May 2016},
	volume = {142},
	number = {8},
	month = {May},
	year = {2016},
	issn = {0975-8887},
	pages = {36-39},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume142/number8/24919-2016909888},
	doi = {10.5120/ijca2016909888},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

In the age of Information Technology Information Security is very important. To provide the security to the communication data, we are using different encryption algorithms. Encryption algorithms can be categorized into Symmetric key cryptography and Asymmetric key cryptography. Many of the Symmetric encryption algorithms (DES, 3DES, Blowfish, RC6 etc…) following the feistel structure, some algorithms (AES etc...) are following substitutions, permutations structure. These all are block ciphers. Symmetric Encryption Algorithms encrypting the plain text by using the secret key and producing cipher text. Decryption algorithms takes the cipher text and secret key and produces the original plain text, this is basically the encryption algorithm run in reverse. This paper specifies a new method for Symmetric key cryptography that can be used to protect data which is transferred through internet. This algorithm is not following the feistel structure, substitutions and permutations. This algorithm can be used for stream ciphers and block ciphers.

References

  1. Ganitha-Sara- Sangraha of Mahaviracarya by Rangacarya.M. Cosmo Publication New Delhi, India.
  2. Federal Information Processing Standards Publication 46-3, 1999 October 25, Announcing the DATA ENCRYPTION STANDARD(DES)
  3. Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell.
  4. Cryptography and Network Security by Behrouz A. Forouzan.
  5. Cryptography and Network Security Principles and Practices by William Stallings.
  6. Discrete Mathematics and Its Applications 2nd Edition, Kenneth H. Rosen, Ph.D.
  7. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, R.L. Rivest, A. Shamir, and L. Adleman.
  8. P.Princy, A Comparison of Symmetric Key Algorithms DES, AES, Blowfish, RC4, RC6: A Survey. International Journal of Computer Science & Engineering Technology (IJCSET) Vol.6 No.05 May 2015.
  9. A Symmetric Key Cryptographic Algorithm. 2010 International Journal of computer Applications (0975-8887) Vol. 1-No.15.
  10. Superiority of Blowfish Algorithm. International Journal of Advanced Research in Computer Science and Software Engineering. Vol. 2, Issue 9, September 2012. Pratap Chnadra Mandal.
  11. Secure Message Transmission with Low Computation. International Journal of Engineering and Innovative Technology (IJEIT) vol.1, Issue 6, June 2012. Dr.K.Venu Gopla Rao, Dr.P.Ramkumar.
  12. CryptDB: Protecting Confidentiality with Encrypted Query Processing. Raluca Ada Popa, Catherine M.S.Redfield, Nickolai Zeldovich, and Hari Balakrishnan MIT CSAIL.

Keywords

Symmetric key cryptography, Plain text, Cipher text, Secret key, Encryption algorithm Decryption algorithm, Rasilabdacheda misravibhaga sutram, Divisor, Dividend, Quotient.