CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG)

by Zeenat Mahmood, J. L. Rana, Ashish Khare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 19
Year of Publication: 2012
Authors: Zeenat Mahmood, J. L. Rana, Ashish Khare
10.5120/7908-0973

Zeenat Mahmood, J. L. Rana, Ashish Khare . Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG). International Journal of Computer Applications. 50, 19 ( July 2012), 7-11. DOI=10.5120/7908-0973

@article{ 10.5120/7908-0973,
author = { Zeenat Mahmood, J. L. Rana, Ashish Khare },
title = { Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG) },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 19 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number19/7908-0973/ },
doi = { 10.5120/7908-0973 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:48:42.461673+05:30
%A Zeenat Mahmood
%A J. L. Rana
%A Ashish Khare
%T Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG)
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 19
%P 7-11
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The present work deals with a new symmetric key cryptographic method using dynamic key. The demand for adequate security to electronic data system grows high over the decades. In the present work the authors have used the Linear Congruential Generator (LCG) for generating key. This is a block cipher technique. The advantage of the present method is that for every pair of encryption & decryption operation a new dynamic key is generated thus the process is very hard to break. The cryptography no longer relies on long term shared keys which are vulnerable under cryptanalysis attacks. It is impossible to detect patterns with which to perform cryptanalysis on the dynamic key. In the present work the authors have introduced concept of dynamic key with symmetric cryptography. Dynamic key is similar to one time pad. In this paper, a dynamic key theory is described and mathematically analyzed. In the present method author proposed a cryptography system in which four rounds of encryption & decryption are performed. In each round different parts of dynamic key are applied in order to make it hard against cryptanalysis attacks.

References
  1. Wiliam Stallings," Cryptography and Network" , 3rd edition , Penntice Hall, ISBN 0-13- 111502-2, 2003.
  2. Behrouz A. Forouzan,"Cryptography & Network Security" Tata McGraw Hill, ISBN 13-978-0-07-066046-5.
  3. M. Blaze, W. Diffie, R. L. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Wiener," Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security",Report of Ad Hoc Panel of Cryptographers and Computer Scientists, Jan. 1996.
  4. W. Diffie and M. E. Hellman, "New directions in cryptography, " IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976
  5. Ayushi, " A Symmetric Key Cryptographic Algorithm "International Journal of Computer Applications (0975 8887) Volume 1 – No. 15
  6. Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, and Balasubramaniam Srinivasan "Dynamic Key Cryptography and Applications " International Journal of Network Security, Vol. 10, No. 3, PP. 161{174, May 2010
  7. R. Divya & T. Thirumurugan, "A Novel Dynamic Key Management Scheme Based On Hamming Distance for Wireless Sensor Networks" , International Journal of Scientific & Engineering Research Volume 2, Issue 5, May- 2011,ISSN 2229-5518
  8. Yunpeng Zhang, Fei Zuo, Zhengjun Zhai and Cai Xiaobin. 2008. A New Image Encryption Algorithm Based on Multiple Chaos System. International Symposium on Electronic Commerce and Security. 347-350.
  9. Xukai Zou, Yogesh Karandikar and Elisa Bertino, "A Dynamic key management solution to access hierarchy", International Journal of Network Management 2007; 17: 437- 450
  10. P. Hellekalek "Good random number generators are (not so) easy to find Mathematics and Computers in Simulation "46 (1998) 485±505
  11. Dr. Ranjan Bose and Amitabha Banerjee "IMPLEMENTING SYMMETRIC CRYPTOGRAPHY USING CHAOS FUNCTIONS"
  12. L. Law, A. Menezes, M. Qu, J. Solinas, S. Vanstone, "An effcient protocol for authenticated key agreement," Designs, Codes and Cryptography, vol. 28, no. 2, pp. 119-134, 2003
  13. F. Sun, S. Liu, Z. Li and Z. Lü. , 2008. A novel image encryption scheme based on spatial chaos map. Chaos, Solitons and Fractals, 38 (3), 631 – 640.
Index Terms

Computer Science
Information Sciences

Keywords

Symmetric key cryptography Encryption Decryption Dynamic key Linear Congruential Generator