IJCNIS Vol. 5, No. 10, 8 Aug. 2013
Cover page and Table of Contents: PDF (size: 201KB)
Full Text (PDF, 201KB), PP.37-43
Views: 0 Downloads: 0
Cryptography, Symmetric Key, Encryption, Decryption
Exchange of data over the internet is increasing day by day. Security is the main issue in communication over a network. Protection must be given against intruders. Hence Cryptography plays a vital role in providing security. There are two basic types of cryptography: Symmetric Key and Asymmetric Key. Symmetric Key uses same or single key for encryption and decryption whereas Asymmetric Key uses separate keys for encryption and decryption. The most commonly used are the Symmetric Key algorithms. The strength of these algorithms is based on the difficulty to break the original messages. In this paper, a new Symmetric Key algorithm called as KED (Key Encryption Decryption) using modulo69 is proposed. Here not only alphabets and numbers are used, but special characters have also been included. Two keys are used in which one is a natural number which is relatively prime to 69 and finding the inverse modulo69 of it and the other key is a random number generated by the proposed key generation method. The proposed algorithm is used for Encryption and Decryption.
Janailin Warjri, E. George Dharma Prakash Raj, "KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69", International Journal of Computer Network and Information Security(IJCNIS), vol.5, no.10, pp.37-43, 2013. DOI:10.5815/ijcnis.2013.10.06
[1]S. William, “Cryptography and Network Security: Principles and Practice”, 2nd edition, Prentice-Hall, Inc., 1999.
[2]S. Hebert, “A Brief History of Cryptography”, an article available at http://cybercrimes.net/aindex.html.
[3]ATUL KAHATE, “Computer and Network security”.
[4]K. Gary, “An Overview of Cryptography”, an article available at www.garykessler.net/library/crypto.html.
[5]E.Surya, C.Divya, “A Survey on Symmetric Key Encryption Algorithms”, International Journal of Computer Science & Communication Networks , Vol 2(4), 475-477.
[6]Tony M.Damico, “A Brief History Of Cryptography”, an article available at http://www.studentpulse.com/articles/41/a-brief-history-of-cryptography.
[7]Cryptography, http://www.newworldencyclopedia.org/entry/ Cryptography.
[8]Oded Goldreich, “Foundations of cryptography: basic tools”, 2001.
[9]A. J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone. “Handbook of applied cryptography”, 1997.
[10]”Cryptanalysis” available at http://en.wikipedia.org/wiki/Cryptanalysis.
[11]“Basic Cryptographic Algorithms”,an article available atwww.itsc.state.md.us/oldsite/info/InternetSecurity/ Crypto/CryptoIntro.htm#Algorithms .
[12]International William Stalling , “Cryptographic and Network Security- Principles and Practices”, Prentice.
[13]“Data Encryption Standard,” Federal Information Processing Standards Publication No. 46, National Bureau of Standards, January 15, 1977.
[14]Prakash Kuppuswamy , Dr. Saeed Q Y Al-Khalidi, “Implementation Of Security Through Simple Symmetric Key Algorithm Based On Modulo 37”, International Journal of Computers & Technology, ISSN: 2277-3061, Volume 3, OCT 2012.
[15]Vishwa gupta, Gajendra Singh, Ravindra Gupta, “Advance Cryptography algorithm for improving data security”, International Journal Of Advnced Research in Computer Scienc and Software Engineering, Volume 2, Issue 1, January 2012.
[16]Ayushi, “A Symmetric Key Cryptographic Algorithm” International Journal of Computer Applications (0975-8887), Volume 1, 2010.
[17]Dinesh Goyal,Vishal Srivastava, “RDA Algorithm: Symmetric Key Algorithm” International Journal Of Information and Communication Technology Research , volume 2,April 2012.
[18]Suyash Verma, Rajnish Choubey, Roopali Soni, “An Efficient Developed New Symmetric Key Cryptography Algorithm For Information Security” , July 2012.
[19]Monika Agarwal, Pradeep Mishra, “A Modified Approach For Symmetric Key Cryptography Based On Blowfish Algorithm”, August 2012.
[20]Uttam Kr.Mondal, Satyendra Nath Mandal, J.PalChoudhury, J.K.Mandal, “Frame Based Symmetric Key Cryptography”, 2011.
[21]K.Govinda, E.Sathiyamoorth, “Multilevel Cryptography Technique Using Graceful Codes” , July 2011.
[22]Jamal N. Bani Salameh, “A New Symmetric-Key Block Ciphering Algorithm”, 2012.
[23]“Inverse Function”, available at http://en.wikipedia.org/wiki/Inverse_function.