CFP last date
20 May 2024
Reseach Article

A Two Round Block Cipher Symmetric Key Cryptography based on Key Stream

by Gautam Rakshit, Suman Deb, Ashim Saha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 18
Year of Publication: 2013
Authors: Gautam Rakshit, Suman Deb, Ashim Saha
10.5120/12171-8337

Gautam Rakshit, Suman Deb, Ashim Saha . A Two Round Block Cipher Symmetric Key Cryptography based on Key Stream. International Journal of Computer Applications. 70, 18 ( May 2013), 42-47. DOI=10.5120/12171-8337

@article{ 10.5120/12171-8337,
author = { Gautam Rakshit, Suman Deb, Ashim Saha },
title = { A Two Round Block Cipher Symmetric Key Cryptography based on Key Stream },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 18 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 42-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number18/12171-8337/ },
doi = { 10.5120/12171-8337 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:33:14.134633+05:30
%A Gautam Rakshit
%A Suman Deb
%A Ashim Saha
%T A Two Round Block Cipher Symmetric Key Cryptography based on Key Stream
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 18
%P 42-47
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data security is one of the challenges of all times. In the modern computer parlance it is important to secure the vital data. One of the common aspects of data security is the privacy for which Cryptography is the promising methodology. Cryptographic computations can be used in different concerned areas of computer communication for encrypting and transmitting the information. cryptography has shown its effectiveness in the field of secured data transmission and much research work is going on to make the computational process more complex to the unauthorized users so that they cannot decrypt the information in a reasonable time. In this research work, strong substitution based encryption algorithms are proposed and the encryption and decryption process are broadly divided into two rounds and key stream generating procedures are proposed. The proposed procedures are being implemented, analyzed and it shows its efficiency in computation, storage and transmission; and it is more powerful during the decryption process. Proper care has been taken so as to keep the cipher text output file size as close to the plain text file size for fast transmission and besides these the decryption time is more than the encryption time. This paper includes the procedures like Substituent list generation, key generation, encryption and decryption that are continued and enhanced from the previous proposed work [10]. The performances are finally demonstrated and its implementations (using C # language) are explained and analyzed.

References
  1. AtulKahate: "Cryptography and Network security" Tata McGraw Hill Education Pvt. Ltd(2nd edition 2003). Chapter and page no .
  2. William Stallings. Cryptography and Network Security, Third Edition, Prentice Hall International, 2003.
  3. Behrouz A. Forouzan:" Cryptography and Network security" McGraw Hill companies(special indian edition, 2007).
  4. Gehani Ashish, La Bean, Thomas H. Reif, JohnH, "DNA-Based Cryptography", Department of Computer Science, Duke University, June 1999
  5. Guangzhao Cui Limin Qin Yanfeng Wang Xuncai Zhang. An encryption scheme using DNA technology. Bio-Inspired Computing: Theories and Applications,2008. BICTA 2008. 3rd International Conference on Publication Date: Sept. 28 2008-Oct. 1 2008 ISBN: 978-1-4244-2724-6, page(s):37-42;Adelaide, SA.
  6. Guangzhao Cui Limin Qin Yanfeng Wang Xuncai Zhang; Information Security Technology Based on DNA Computing; Anti-counterfeiting, Security, Identification, 2007 IEEE International Workshop on 16-18 April 2007,page(s): 288-291, ISBN: 1-4244-1035-5, Location: Xiamen, Fujian.
  7. S. V. Kartalopoulos, DNA-inspired cryptographic method in optical communications, authentication and data mimicking, Proc. of the IEEE on Military Communications Conference, vol. 2, pp. 774-779, 2005.
  8. G. Cui, L. Qin, Y. Wang and X. Zhang, Information security technology based on DNA computing, Proc. of the 2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, Xiamen, China, pp. 288-291, 2007.
  9. D. Boneh, C. Dunworth and R. Lipton, Breaking DES using a molecular computer, Technical Report, CS-TR-489-95, Princeton University, 1995.
  10. Bibhash Roy, Gautam Rakshit, Pratim Singha, Atanu Majumder, Debabrata Datta, "An improved Symmetric key cryptography with DNA Based strong cipher"- ICDeCom-2011, Feb' 24-25'2011, pp. 1-5,2011 Birla Institute of Technology, Meshra, Ranchi, Jharkhand, India pulished at IEEE Explorer. ISBN:978-1-4244-9189-6, ACCESSION NO: 11887756.
Index Terms

Computer Science
Information Sciences

Keywords

Security encryption decryption key generation cipher text plain cryptosystem