Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Implementation and Analysis of a Novel Block Cipher

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 89 - Number 8
Year of Publication: 2014
Authors:
M. Kiran Reddy
K. J. Jegadish Kumar
10.5120/15525-4340

Kiran M Reddy and Jegadish K J Kumar. Article: Implementation and Analysis of a Novel Block Cipher. International Journal of Computer Applications 89(8):34-36, March 2014. Full text available. BibTeX

@article{key:article,
	author = {M. Kiran Reddy and K. J. Jegadish Kumar},
	title = {Article: Implementation and Analysis of a Novel Block Cipher},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {89},
	number = {8},
	pages = {34-36},
	month = {March},
	note = {Full text available}
}

Abstract

This paper presents a new cryptographic technique for secured transmission of text and image data over communication networks. The new algorithm named Fixed Block with Dynamic key (FBDK) is designed using simple operations like XOR, circular shifts, substitutions. It uses input fixed blocks of any size based on the size of the original message bits and key size is dynamic for each block which makes it more resistant to cryptanalysis. The performance analysis of FBDK algorithm for digital images, text data is performed. Experimental tests are carried out in detail to show high quality, efficiency of FBDK algorithm.

References

  • Ashwak Al-Abiachi, M. , Faudziah Ahmad, and Ku Ruhana. 2011. A Competitive Study of Cryptography Techniques over block cipher .
  • Amitesh Singh Rajput, Nishchol Mishra, and Sanjeev Sharma. 2013. Towards the Growth of Image Encryption and Authentication Schemes.
  • Chen, C. Y. , Chang, C. C. , and Yang, W. P. 1996. Hybrid method to modular exponentiation with precomputations.
  • Morris Mano, M. , and Michael ciletti, D. 2008. Digital Design. Fourth edition.
  • Koblitz, N. 1994. A Course in Number Theory and Cryptography. Second Edition.
  • Nitty Sarah Alex, Jani Anbarasi, L. 1985. Enhanced Image Secret Sharing via Error Diffusion in Halftone Visual Cryptography.
  • Chen, G. , Mao, Y. , and Chui, C. K. 2004. A symmetric image encryption scheme based on 3D chaotic cat maps.
  • Arul jothi, S. , and Venkatesulu, M. 2012. Encryption Quality and Performance Analysis of GKSBC algorithm.