CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Variable Size Block Encryption using Dynamic-key Mechanism (VBEDM)

by K.C.Shyamala Bai, Dr.M.V.Satyanarayana, Dr. P.A. Vijaya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 27 - Number 7
Year of Publication: 2011
Authors: K.C.Shyamala Bai, Dr.M.V.Satyanarayana, Dr. P.A. Vijaya
10.5120/3311-4539

K.C.Shyamala Bai, Dr.M.V.Satyanarayana, Dr. P.A. Vijaya . Variable Size Block Encryption using Dynamic-key Mechanism (VBEDM). International Journal of Computer Applications. 27, 7 ( August 2011), 27-30. DOI=10.5120/3311-4539

@article{ 10.5120/3311-4539,
author = { K.C.Shyamala Bai, Dr.M.V.Satyanarayana, Dr. P.A. Vijaya },
title = { Variable Size Block Encryption using Dynamic-key Mechanism (VBEDM) },
journal = { International Journal of Computer Applications },
issue_date = { August 2011 },
volume = { 27 },
number = { 7 },
month = { August },
year = { 2011 },
issn = { 0975-8887 },
pages = { 27-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume27/number7/3311-4539/ },
doi = { 10.5120/3311-4539 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:13:10.981808+05:30
%A K.C.Shyamala Bai
%A Dr.M.V.Satyanarayana
%A Dr. P.A. Vijaya
%T Variable Size Block Encryption using Dynamic-key Mechanism (VBEDM)
%J International Journal of Computer Applications
%@ 0975-8887
%V 27
%N 7
%P 27-30
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The weak point of the existing block encryption scheme is that the plain text or encryption key could be easily exposed differential cryptanalysis or linear cryptanalysis, which is mostly used for decoding block encryption. This is because the encryption schemes have been designed for the fixed size encryption key. Another weak point of the existing block encryption algorithm is that it has a fixed permutation table and fixed number of encryption rounds. In order to overcome these weaknesses, an encryption algorithm using unlimited size of key and dynamically changing permutation table should be designed. A new encryption technique called Variable size Block Encryption using Dynamic-key Mechanism (VBEDM), which is designed with unlimited key size, dynamically changing permutation table based on the encryption key and variable block size for each round. To make the cryptanalyst hard to expose the plain text, from the array of compression algorithms the VBEDM uses a compression technique based on key. The compression used is not for compressing the text but for strengthening the encryption method. Because of its dynamic functionality in input block size, key size, permutation, number of rounds and compression it makes the crypt analyst too hard to analyzing the cipher text. This algorithm also uses a compression technique from an array of compression algorithm resulting in more confusion to the analyst.

References
  1. Hamid Mirvaziri, Kasmiran Jumari Mahamod Ismail and Zurina Mohd Hanapi, “Message Based Random Variable Length Key Encryption Algorithm” Journal of Computer Science 5 (8): 573-578, 2009.
  2. Howard M. Heys, “Analysis of the Statistical Cipher FeedbackMode of Block Ciphers”, IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 1, JANUARY 2003.
  3. Zhu Shun-le , Wang Ya-xiang , Li Xin , “Design and Analysis of Variable-length Block Encryption Based on Chaos Particle Swarm” , Hefei, China. August 24–27, 2010.
  4. Marc Joye, “On White-Box Cryptography”, Security of Information and Networks, pp. 7-12, Trafford Publishing, 2008.
  5. John B. Lacy, Donald P. Mitchell, William M. Schell CryptoLib: Cryptography in Software, AT&T Bell Laboratories.
  6. Luke O’Connor, A Differential Cryptanalysis of Tree-Structure Substitution-Permutation Networks.
  7. Chang-Doo Lee, Bong-Jun Choi, Kyoo-Seok Park, Design and evaluation of a block encryption algorithmusing dynamic-key mechanism,Future Generation Computer Systems 20 (2004) 327–338, http:// www.elsevier.com/locate/future/.
  8. Alfred J Menezes, Paul C van Oorschot, Scot A Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
  9. E Biham, New Types of Cryptanalytic Attack using Related Keys, Journal of Cryptology, vol.7 No. 4, 1994, pp.229-2
  10. E Biham and A Shimir, Differential cryptanalysis of DES-like cryptosystem, Journal of Cryptology, 4 (1991), 3-72.
  11. Wu Wenling, Feng Dengguo, Zhang Wentao. Design and Analysis of Block Cipher (Second Edition)
  12. M.Tsinghua university Press, 2009.
  13. Wil Michiels, Paul Gorissen, and Henk D.L Hollmann, “Cryptanalysis of a Generic Class of White-Box Implementation”, SAC 2008, LNCS 5381, pp. 414-428, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Symmetric Encryption Variable Size Block Encryption Cryptographic Algorithms Dynamic Key Mechanism