CFP last date
20 May 2024
Reseach Article

Hybridize Dynamic Symmetric Key Cryptography using LCG

by Zeenat Mahmood, Anurag Jain, Chetan Agrawal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 60 - Number 17
Year of Publication: 2012
Authors: Zeenat Mahmood, Anurag Jain, Chetan Agrawal
10.5120/9784-4331

Zeenat Mahmood, Anurag Jain, Chetan Agrawal . Hybridize Dynamic Symmetric Key Cryptography using LCG. International Journal of Computer Applications. 60, 17 ( December 2012), 18-26. DOI=10.5120/9784-4331

@article{ 10.5120/9784-4331,
author = { Zeenat Mahmood, Anurag Jain, Chetan Agrawal },
title = { Hybridize Dynamic Symmetric Key Cryptography using LCG },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 60 },
number = { 17 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 18-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume60/number17/9784-4331/ },
doi = { 10.5120/9784-4331 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:07:12.750614+05:30
%A Zeenat Mahmood
%A Anurag Jain
%A Chetan Agrawal
%T Hybridize Dynamic Symmetric Key Cryptography using LCG
%J International Journal of Computer Applications
%@ 0975-8887
%V 60
%N 17
%P 18-26
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the present work, a block cipher is presented which deals with a dynamic symmetric key cryptographic method using substitution and transposition technique. In this work a dynamic secret key is generated using Linear Congruential Generator (LCG). The striking feature of the present work is creation of a new secret key for every pair of encryption and decryption operation, thus secret key is a dynamic key. After encryption and decryption operation the dynamic key is discarded. The proposed cryptography method is a process consisting of two rounds of encryption and two rounds of decryption. The key generation algorithm uses SHA-1 hashing scheme to produce key of size 196 bits. This key is used to encrypt plain text of variable size. Since this is a block cipher method authors divide the variable size plaintext into 'n' fixed size (49 bit) blocks. The notion of dynamic key has evolved from the concept of the one time pad. Different parts of dynamic secret key are used in different places in order to make it harder for cryptanalysis or attacks.

References
  1. Zeenat Mahmood , Ashish khare "Symmetric Key Cryptography using Dynamic Key & Linear Congruential Generator (LCG)" , International Journal of Computer Applications Volume 50– No. 19, July 2012
  2. Wiliam Stallings," Cryptography and Network" , 3rd edition , Penntice Hall, ISBN 0-13- 111502-2, 2003.
  3. Behrouz A. Forouzan,"Cryptography & Network Security" Tata McGraw Hill, ISBN 13-978-0-07-066046-5.
  4. M. Blaze, W. Diffie, R. L. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Wiener," Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security",Report of Ad Hoc Panel of Cryptographers and Computer Scientists, Jan. 1996.
  5. Ayushi, " A Symmetric Key Cryptographic [Algorithm "International Journal of Computer Applications (0975 8887) Volume 1 – No. 15
  6. W. Diffie and M. E. Hellman, "New directions in cryptography, " IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976
  7. Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, and Balasubramaniam Srinivasan "Dynamic Key Cryptography and Applications " International Journal of Network Security, Vol. 10, No. 3, PP. 161{174, May 2010
  8. R. Divya & T. Thirumurugan, "A Novel Dynamic Key Management Scheme Based On Hamming Distance for Wireless Sensor Networks" , International Journal of Scientific & Engineering Research Volume 2, Issue 5, May- 2011,ISSN 2229-5518
  9. Yunpeng Zhang, Fei Zuo, Zhengjun Zhai and Cai Xiaobin. 2008. A New Image Encryption Algorithm Based on Multiple Chaos System. International Symposium on Electronic Commerce and Security. 347-350.
  10. Xukai Zou, Yogesh Karandikar and Elisa Bertino, "A Dynamic key management solution to access hierarchy", International Journal of Network Management 2007; 17: 437- 450
  11. P. Hellekalek "Good random number generators are (not so) easy to find Mathematics and Computers in Simulation "46 (1998) 485±505
  12. Dr. Ranjan Bose and Amitabha Banerjee "IMPLEMENTING SYMMETRIC CRYPTOGRAPHY USING CHAOS FUNCTIONS"
  13. L. Law, A. Menezes, M. Qu, J. Solinas, S. Vanstone, "An effcient protocol for authenticated key agreement," Designs, Codes and Cryptography, vol. 28, no. 2, pp. 119-134, 2003
  14. F. Sun, S. Liu, Z. Li and Z. Lü. , 2008. A novel image encryption scheme based on spatial chaos map. Chaos, Solitons and Fractals, 38 (3), 631 – 640.
Index Terms

Computer Science
Information Sciences

Keywords

Symmetric key cryptography Encryption Decryption Dynamic secret key Linear Congruential Generator Hybrid technique Transposition Substitution