IJCNIS Vol. 4, No. 11, 8 Oct. 2012
Cover page and Table of Contents: PDF (size: 469KB)
Full Text (PDF, 469KB), PP.55-61
Views: 0 Downloads: 0
Cryptography, Encryption, Cipher, Decryption, 512 bit Block and SP Network
The internet today is being used by millions of users for a large variety of commercial and non commercial purposes. It is controlled by different entities. It is mainly used as an efficient means for communication, entertainment and education. With the rapid growth of internet, there is a need for protecting confidential data. The Internet was however originally designed for research and educational purpose, not for commercial applications.So internet was not designed with security in mind. As the internet grows the existing security framework was not adequate for modern day applications. Cryptography play a vital role in providing security.Lot of research is going on block cipher algorithms. In this paper we present a new 512 bit block cipher named SF Block cipher. The proposed cipher is developed based on design principle known as Substitution permutation network (SP Network). The algorithm is implemented in .NET Framework and MATLAB. Cryptanalysis is carried out in the encrypted file. It was found that the encrypted file with this algorithm is difficult to break.Simulation results shows that the proposed Block cipher has better performance over other algorithms such as AES and Blowfish
M. Anand Kumar, S.Karthikeyan, "A New 512 Bit Cipher for Secure Communication", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.11, pp.55-61, 2012. DOI:10.5815/ijcnis.2012.11.07
[1]Alaa, T., A.A. Zaidan and B.B. Zaidan, 2009. New framework for high secure data hidden in the MPEG using AES encryption algorithm. Int. J. Comput. Electr. Eng., 1: 566-571.
[2]Alanazi, H.O., B.B Zaidan, A.A. Zaidan, A.H. Jalab, M. Shabbir and Y. Al-Nabhani, 2010. New comparative study between DES, 3DES and AES within nine factors. J. Comput., 2: 152-157.
[3]Behrouz A. Forouzan, 2005. TCP/IP Protocol Suite 3re Edn Tata McGraw Hill, pp: 30-46
[4]Bradner. S., 2006.The End-to-End Security IEEE Security & Privacy, 12:76-79.
[5]Colitti, L., Battista, G.D and Patrignani, M,2009.IPv6-in-IPv4 tunnel discovery: methods and experimental results. IEEE Transactions on Network and Service Management
[6]Dewu Xu Wei Chen., 2010.3G communication encryption algorithm based on ECC-ElGamal. International conference on signal processing systems, pp 47-54.
[7]Douligeris.C and Serpanos D., 2007. IP Security (IPSec). IEEE Book: Network Security: Current Status and Future Directions, 65 – 82
[8]Feistel, H., 1973. Cryptography and computer privacy. Sci. Am., 228: 15-23.
[9]Heng Yin Haining Wang., 2007.Building an Application-Aware IPsec Policy System. IEEE/ACM Trans. Networking, 15: 1502 – 1513
[10]Haraty, R.A., El-Kassar, A.N.and Shebaro, B.M., 2006. A Comparative Study of Elgamal Based Digital Signature Algorithms. IEEE Automation congress, 1-7.
[11]Jian, S., J. Sun, Z. Wang and Y. Dai, 2004. A fast video encryption scheme based-on chaos. Proceeding of the 8th IEEE International Conference on Control, Automation, Robotics and Vision, December 6-9, USA., pp: 126-131.
[12]Jiang, J., 1996. Pipeline algorithms of RSA data encryption and data compression. Proceeding of IEEE International Conference on Communication Technology, May 5-7, Beijing, China, pp: 1088-1091.
[13]Macedo, D.F., dos Santos, A.L and Pujolle, G. 2008. From TCP/IP to convergent networks: challenges and taxonomy IEEE Communication Survey and tutorial 10:40-55
[14]Mathis, M, 2009. Reflections on the TCP Macroscopic Model, ComputerCommunication Review
[15]Matin, M.A. Hossain, M.M. Islam, M.F and Islam, M.N,2009. Performance evaluation of symmetric encryption algorithm in MANET and WLAN.IEEE International conference for Technical Postgraduates, pp: 1-4.
[16]Mohammad Al-Jarrah and Abdel-Karim R. Tamimi., 2007.A Thin Security Layer Protocol over IP Protocol on TCP/IP Suite for Security Enhancemen. IEEE Conference in Innovations in Information Technology,1-5
[17]Philip M. Miller., 2009.TCP/IP The ultimate Protocol Guide Data delivery and Routing. Brown walker press
[18]Rabah, K., 2004. Data security and cryptographic techniques: A review. Inform. Technol. J., 3: 106-132.
[19]Rabah, K., 2005. Secure implementing message digest. Authentication and Digital Signature
[20]Wanzhong Sun, Hongpeng Guo, Huilei He and Zibin Dai,2007. Design and optimized implementation of the SHA-2(256, 384, 512) hash algorithms.IEEE Conference on ASIC Processing, 858-861.
[21]Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
[22]Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael. Journal of Applied Sciences, 10: 2161-2167.
[23]W.Stallings, ''Cryptography and Network Security 4th Ed,'' Prentice Hall , 2005,PP. 58-309 .
[24]Masashi Une and Masayuki Kanda, 2007. Year 2010 Issues on Cryptographic Algorithms, Monetary And Economic Studies, Pp 129-164