CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Bit Level Encryption Standard (BLES): Version-I

by Neeraj Khanna, Dripto Chatterjee, Asoke Nath, Joyshree Nath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 52 - Number 2
Year of Publication: 2012
Authors: Neeraj Khanna, Dripto Chatterjee, Asoke Nath, Joyshree Nath
10.5120/8177-1496

Neeraj Khanna, Dripto Chatterjee, Asoke Nath, Joyshree Nath . Bit Level Encryption Standard (BLES): Version-I. International Journal of Computer Applications. 52, 2 ( August 2012), 41-46. DOI=10.5120/8177-1496

@article{ 10.5120/8177-1496,
author = { Neeraj Khanna, Dripto Chatterjee, Asoke Nath, Joyshree Nath },
title = { Bit Level Encryption Standard (BLES): Version-I },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 52 },
number = { 2 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 41-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume52/number2/8177-1496/ },
doi = { 10.5120/8177-1496 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:51:16.903767+05:30
%A Neeraj Khanna
%A Dripto Chatterjee
%A Asoke Nath
%A Joyshree Nath
%T Bit Level Encryption Standard (BLES): Version-I
%J International Journal of Computer Applications
%@ 0975-8887
%V 52
%N 2
%P 41-46
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the present paper the authors have introduced a new symmetric key cryptographic method called Bit Level Encryption Standard(BLES) which is based on bit exchanging or bit reshuffling method. The authors have introduced a completely new bit level encryption method. Nath et. al has already developed bit manipulation method called NJJSAA where the authors mainly used bit level right shift, bit level XOR operation. In the present paper the authors have used bit level exchange using random key generator and also byte level exchange using random key generator. The bit exchange was made using different block sizes such as 16 bits, 64 bits, 256 bits and 1024 bits long. To make the system hard the authors have changed the randomization matrix each time when data is extracted from plain text file and whenever the size of the block is changed. After finishing bit level exchange for the entire file the authors used the byte exchange method. The authors have also introduced a special bit manipulation method so the encryption algorithm will work even for all characters with ASCII Code 0 or all characters with ASCII Code 255. The standard encryption algorithm will fail to encrypt a file where all characters are ASCII '0' or all characters with ASCII '255' but the present method will be able to encrypt a file where all characters are ASCII '0' or all characters are ASCII '255'. The present method will be effective for encrypting short message, password, confidential key etc. The spectral analysis in the result sections shows that the present method is free from known plain text attack, differential attack or any type brute force attack.

References
  1. Symmetric Key Cryptography using Random Key generator : Asoke Nath, Saima Ghosh, Meheboob Alam Mallik: "Proceedings of International conference on security and management(SAM'10" held at Las Vegas, USA Jull 12-15, 2010), Vol-2, Page: 239-244(2010).
  2. Advanced Symmetric key Cryptography using extended MSA method: DJSSA symmetric key algorithm: Dripto Chatterjee, Joyshree Nath, Soumitra Mondal, Suvadeep Dasgupta and Asoke Nath, Jounal of Computing, Vol 3, issue-2, Page 66-71,Feb(2011).
  3. A new Symmetric key Cryptography Algorithm using extended MSA method :DJSA symmetric key algorithm, Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta and Asoke Nath : Proceedings of IEEE International Conference on Communication Systems and Network Technologies, held at SMVDU(Jammu) 03-06 June,2011, Page-89-94(2011).
  4. New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm :Neeraj Khanna, Joel James,Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti and Asoke Nath : Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130(2011).
  5. Symmetric key Cryptography using modified DJSSA symmetric key algorithm, Dripto Chatterjee, Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath, Proceedings of International conference Worldcomp 2011 held at LasVegas 18-21 July 2011, Page-306-311, Vol-1(2011).
  6. An Integrated symmetric key cryptography algorithm using generalized vernam cipher method and DJSA method: DJMNA symmetric key algorithm : Debanjan Das, Joyshree Nath, Megholova Mukherjee, Neha Chaudhury and Asoke Nath: Proceedings of IEEE International conference : World Congress WICT-2011 to be held at Mumbai University 11-14 Dec, 2011, Page No. 1203-1208(2011).
  7. Symmetric key cryptosystem using combined cryptographic algorithms- generalized modified vernam cipher method, MSA method and NJJSAA method: TTJSA algorithm – Trisha Chatterjee, Tamodeep Das, Joyshree Nath, Shayan Dey and Asoke Nath, Proceedings of IEEE International conference : World Congress WICT-2011 t held at Mumbai University 11-14 Dec, 2011, Page No. 1179-1184(2011).
  8. Symmetric key Cryptography using two-way updated – Generalized Vernam Cipher method: TTSJA algorithm, International Journal of Computer Applications(IJCA, USA), Vol 42, No. 1, March, Pg: 34 -39( 2012).
  9. Ultra Encryption Standard(UES) Version-I: Symmetric Key Cryptosystem using generalized modified Vernam Cipher method, Permutation method and Columnar Transposition method, Satyaki Roy, Navajit Maitra, Joyshree Nath,Shalabh Agarwal and Asoke Nath, Proceedings of IEEE sponsored National Conference on Recent Advances in Communication, Control and Computing Technology-RACCCT 2012, 29-30 March held at Surat, Page 81-88(2012).
  10. An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm, Adbvanced Caeser Cipher Algorithm, Bit Rotation and reversal Method : SJA Algorithm. , International Journal of Modern Education and Computer Science, Somdip Dey, Joyshree Nath, Asoke Nath,(IJMECS), ISSN: 2075-0161 (Print), ISSN: 2075-017X (Online), Vol-4, No-5, Page 1-9,2012.
  11. An Advanced Combined Symmetric Key Cryptographic Method using Bit manipulation, Bit Reversal, Modified Caeser Cipher(SD-REE), DJSA method, TTJSA method: SJA-I Algorithm, Somdip dey, Joyshree Nath, Asoke Nath, International Journal of Computer Applications(IJCA 0975-8887, USA), Vol. 46, No. 20, Page- 46-53,May, 2012.
  12. Cryptography and Network Security, William Stallings, Prectice Hall of India.
Index Terms

Computer Science
Information Sciences

Keywords

BLES NJJSAA bit exchange XOR random key differential attack