Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG)

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 50 - Number 19
Year of Publication: 2012
Authors:
Zeenat Mahmood
J. L. Rana
Ashish Khare
10.5120/7908-0973

Zeenat Mahmood, J L Rana and Ashish Khare. Article: Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG). International Journal of Computer Applications 50(19):7-11, July 2012. Full text available. BibTeX

@article{key:article,
	author = {Zeenat Mahmood and J. L. Rana and Ashish Khare},
	title = {Article: Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG)},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {50},
	number = {19},
	pages = {7-11},
	month = {July},
	note = {Full text available}
}

Abstract

The present work deals with a new symmetric key cryptographic method using dynamic key. The demand for adequate security to electronic data system grows high over the decades. In the present work the authors have used the Linear Congruential Generator (LCG) for generating key. This is a block cipher technique. The advantage of the present method is that for every pair of encryption & decryption operation a new dynamic key is generated thus the process is very hard to break. The cryptography no longer relies on long term shared keys which are vulnerable under cryptanalysis attacks. It is impossible to detect patterns with which to perform cryptanalysis on the dynamic key. In the present work the authors have introduced concept of dynamic key with symmetric cryptography. Dynamic key is similar to one time pad. In this paper, a dynamic key theory is described and mathematically analyzed. In the present method author proposed a cryptography system in which four rounds of encryption & decryption are performed. In each round different parts of dynamic key are applied in order to make it hard against cryptanalysis attacks.

References

  • Wiliam Stallings," Cryptography and Network" , 3rd edition , Penntice Hall, ISBN 0-13- 111502-2, 2003.
  • Behrouz A. Forouzan,"Cryptography & Network Security" Tata McGraw Hill, ISBN 13-978-0-07-066046-5.
  • M. Blaze, W. Diffie, R. L. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Wiener," Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security",Report of Ad Hoc Panel of Cryptographers and Computer Scientists, Jan. 1996.
  • W. Diffie and M. E. Hellman, "New directions in cryptography, " IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976
  • Ayushi, " A Symmetric Key Cryptographic Algorithm "International Journal of Computer Applications (0975 8887) Volume 1 – No. 15
  • Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, and Balasubramaniam Srinivasan "Dynamic Key Cryptography and Applications " International Journal of Network Security, Vol. 10, No. 3, PP. 161{174, May 2010
  • R. Divya & T. Thirumurugan, "A Novel Dynamic Key Management Scheme Based On Hamming Distance for Wireless Sensor Networks" , International Journal of Scientific & Engineering Research Volume 2, Issue 5, May- 2011,ISSN 2229-5518
  • Yunpeng Zhang, Fei Zuo, Zhengjun Zhai and Cai Xiaobin. 2008. A New Image Encryption Algorithm Based on Multiple Chaos System. International Symposium on Electronic Commerce and Security. 347-350.
  • Xukai Zou, Yogesh Karandikar and Elisa Bertino, "A Dynamic key management solution to access hierarchy", International Journal of Network Management 2007; 17: 437- 450
  • P. Hellekalek "Good random number generators are (not so) easy to find Mathematics and Computers in Simulation "46 (1998) 485±505
  • Dr. Ranjan Bose and Amitabha Banerjee "IMPLEMENTING SYMMETRIC CRYPTOGRAPHY USING CHAOS FUNCTIONS"
  • L. Law, A. Menezes, M. Qu, J. Solinas, S. Vanstone, "An effcient protocol for authenticated key agreement," Designs, Codes and Cryptography, vol. 28, no. 2, pp. 119-134, 2003
  • F. Sun, S. Liu, Z. Li and Z. Lü. , 2008. A novel image encryption scheme based on spatial chaos map. Chaos, Solitons and Fractals, 38 (3), 631 – 640.