CFP last date
20 May 2024
Reseach Article

A New Framework for Scalable Secure Block Cipher Generation using Color Substitution and Permutation on Characters, Numbers, Images and Diagrams

by Ravindra Babu Kallam, S.Udaya Kumar, A.Vinaya Babu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 20 - Number 5
Year of Publication: 2011
Authors: Ravindra Babu Kallam, S.Udaya Kumar, A.Vinaya Babu
10.5120/2427-3259

Ravindra Babu Kallam, S.Udaya Kumar, A.Vinaya Babu . A New Framework for Scalable Secure Block Cipher Generation using Color Substitution and Permutation on Characters, Numbers, Images and Diagrams. International Journal of Computer Applications. 20, 5 ( April 2011), 37-42. DOI=10.5120/2427-3259

@article{ 10.5120/2427-3259,
author = { Ravindra Babu Kallam, S.Udaya Kumar, A.Vinaya Babu },
title = { A New Framework for Scalable Secure Block Cipher Generation using Color Substitution and Permutation on Characters, Numbers, Images and Diagrams },
journal = { International Journal of Computer Applications },
issue_date = { April 2011 },
volume = { 20 },
number = { 5 },
month = { April },
year = { 2011 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume20/number5/2427-3259/ },
doi = { 10.5120/2427-3259 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:21.432348+05:30
%A Ravindra Babu Kallam
%A S.Udaya Kumar
%A A.Vinaya Babu
%T A New Framework for Scalable Secure Block Cipher Generation using Color Substitution and Permutation on Characters, Numbers, Images and Diagrams
%J International Journal of Computer Applications
%@ 0975-8887
%V 20
%N 5
%P 37-42
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The aim of our research is to develop a new framework for secure block cipher generation using color substitution and permutations on alphanumeric letters, symbols, images, diagrams or any kind of text. To transfer the keys from source to destination we have used RSA public key algorithm and for encryption / decryption of the information, we have used our invented ‘play color substitution’ algorithm. Importance of RTF will be explained, Cryptanalysis attacks were discussed and shown that the cipher cannot be broken by any cryptanalysis attacks.

References
  1. Adams, C.M., 1997. The CAST-128 encryption algorithm. RFC 2144, May 1997.
  2. Daemen J and V.Rijmen, 2001. Rijndel, the advanced encryption standard (AES). Dr. Dobb’s J., 26: 137- 139.
  3. Daemen J, S. Borg and V. Rijmen, 2002. The Design of Rijndael: AES-the Advanced Encryption Standard. Springer- Verlag, ISBN 3-540-42580-2.
  4. Feistel, H. 1973, Cryptography and Computer privacy. Sci. Am., 288: 15-23.
  5. Feistel, H., W. Notz and Smith, 1975. Some Cryptographic techniques for machine to machine data communications. Proceedings of the IEEE, 63: 1545-1554
  6. Rivest, R.L., 1995. The RC5 encryption algorithm. Dr. Dobbs J., 20: 146-148.
  7. Ravindra Babu K, Dr.S. Udaya Kumar, A Survey on Cryptography and Steganography Methods for Information Security, IJCA, Volume-12, No-2, November 2010
  8. Ravindra Babu K, Dr. Udaya kumar, Dr. A.Vinaya Babu, An Improved Playfair Cipher Cryptographic Substitution Algorithm, IJARCS, Volume 2, No-1, Jan-Feb 2011.
  9. Ravindra Babu K, Dr. S.Udaya Kumar, Dr.A.Vinaya Babu, An enhanced and efficient cryptographic substitution method for information security, IJNS, (Paper in a journal)
  10. Schneier B, 1994. The blowfish encryption algorithm. Dr. Dobbs J., 19: 38-40
  11. Sastry V.U.K, S. Udaya Kumar and A. Vinaya babu, 2006, A large block cipher using modular arithmetic inverse of a key matrix and mixing of the key matrix and the plain text. J.Comput. Sci., 2: 698-703
  12. S. Udaya Kumar, A.Vinaya Babu, 2006, A Large block cipher using an iterative method and the modular arithmetic inverse of a key matrix. IAENG Int. J. Comput. Sci., 32: 395-401.
  13. S. Udaya kumar, Sastry and A.Vinaya Babu, 2007. A block cipher involving interlacing and decomposition. Inform. Technol. J., 6: 396 – 404
  14. V.U.K.Sastry, Aruna, S.Udaya Kumar, A Modern Hill Cipher Involving a Permuted key and Modular arithmetic Addition Operation, IJARCS, Vol 2, No 1, Jan-Feb 2011.
  15. Lt. Ravindra Babu Kallam, Dr. S.Udaya Kumar, A Block Cipher generation using Color Substitution, IJCA, 2010 Vol 1, No-28.
  16. William Stallings, Cryptography and Network Security, Principles and practice, 5th edition, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

RSA ETF: Electronic Frontier Foundation PUB: Public key of user B PRA: Private Key of user A PUA: Public key of user A PRB: Private key of user B PCC: Play color cipher RTF: Rich text format LHS: Left hand side RHS: Right hand side.