Enhanced Simplified Symmetric Key Encryption Algorithm

Download Article

DOI: 10.21522/TIJAR.2014.03.02.Art006

Authors : Mahendra Kumar Shrivas, Antwi Baffour Boasiako, Sangeetha Krishanan, Thomas Yeboah

Abstract:

Data has become very important not only for individuals but for organizations as well. Data security is the biggest challenge that we care facing currently. Recent successful hacks and data breaches have certainly played an important role in the development of data security related technologies.

Cryptography is a well adopted method to ensure that data is secure and confidentiality of user data is maintained.

The content owner encrypts the actual data using an encryption key which converts the data into cipher text. The cipher text is an intermediate data which is unreadable form which can be shared amount other users and can be stored in the various storage media.

The cipher text can be converted into the actual data using the same encryption key in case of symmetric key encryption or using different key in case of asymmetric key encryption.

Currently, the Encryption/Decryption algorithms that exist depend on complex mathematical manipulations. The length of the encryption keys are growing and growing to get more secure and more stronger encryption thus processing throughput and memory consumption requirement is also growing.

In this work researchers are focusing on various symmetric key encryption throughput and memory consumption with proposed high speed new algorithm which can be useful for the devices with low memory and processing capabilities. The work sought the possibility to trim down the complicated throughput of symmetric cryptography and ensuring maximum security at the same time.

Keywords: Cryptography, Algorithms, Authentication, Cipher text, Complex Mathematical Manipulations, Encryption, Decryption, Symmetric Key.

References:

[1]. Agrawal, M., & Mishra, P. (2012). A Comparative Survey on Symmetric Key Encryption Techniques. International Journal on Computer Science and Engineering, 877-882.

[2]. Ahmad, S., Alam, K. M., Rahman, H., & Tamura, S. (2015). A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. Networking Systems and Security (NSysS), 2015 International Conference on (pp. 1-5). Dhaka, Bangladesh: IEEE. doi: DOI: 10.1109/NSysS.2015.7043532

[3]. Ajay K., S. M. (January, 2012). Comparison of Various Encryption Algorithms and Techniques for Secured Data Communication in Multinode Network. International Journal of Engineering and Technology Volume 2 No. 1, ISSN: 2049-3444 © 2011 – IJET Publications UK., 87-92.

[4]. Alabaichi, A., Ahmad, F., & Mahmod, R. (2013). Security analysis of blowfish algorithm. Informatics and Applications (ICIA), 2013 Second International Conference on (pp. 12-18). Malaysia: IEEE. doi:10.1109/ICoIA.2013.6650222

[5]. Al-Hazaimeh, O. M. (March 2013). A New Approach for Complex Encrypting and Decrypting Data. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, 95-103.

[6]. Ankita P. B., L. S. (April - 2013). A Comparative Literature Survey On Various Image Encryption Standards. International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 4, ISSN: 2278-0181, 1444-1450.

[7]. Klinc, D., Hazay, C., Jagmohan, A., Krawczyk, H., & Rabin, T. (2012, 11). On Compression of Data Encrypted With Block Ciphers. IEEE Transactions on Information Theory, Vol-58(Issue-11), 6989 - 7001. doi: DOI: 10.1109/TIT.2012.2210752

[8]. Mandar M. K., P. B. (March 2013). Encryption Algorithm Addressing GSM Security Issues- A Review. International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 2 Issue 2, ISSN: 2278-621X, 268-273.

[9]. Paar C. and Pelzl J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. ISBN 978-3-642-04101-3.

[10]. Shah K. R., B. G. ( March, 2012). New Approach of Data Encryption Standard. International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-2, Issue-1, 322-325.

[11]. Sharma, H. A. (2010). Implemenentation and analysis various symmetric cryptosystems. Indian Journal of Science and Technology Vol. 3 No. 12 ISSN:0974-6846, 1173-1176.

[12]. Shrivas, M. K., & Singh, S. V. (2014, June). Added Advanced Encryption Standard (A-Aes): With 512 Bits Data Block And 512, 768 And 1024 Bits Encryption Key. International Journal of ICT and Management, Vol-II (Issue-1), 65-71. Retrieved 2016, from http://www.ijictm.org/admin/html/mail/attach/2014-08-06-03-48-23.pdf

[13]. Shrivas, M. K., & Singh, S. V. (2015). Implementing ADDED ADVANCED ENCRYPTION STANDARD (A-AES) to Secure Data on the Cloud. 3rd International Conference on Management, Communication and Technolog (ICMCT) (pp. 17-24). Accra, Ghana: IJICTM. Retrieved 2016, from http://www.ijictm.org/admin/html/mail/attach/2015-08-07-09-55-57.pdf

[14]. Shrivas, M. K., Dr. Amoako, A., Boateng, S. O., & Dr. Yeboah, T. (2015, 10). Migration Model for unsecure Database driven Software System to Secure System using Cryptography. The International Journal of ICT and Management, Vol-II (Issue-2), 1-8. Retrieved 2016, from http://www.ijictm.org/admin/html/mail/attach/2015-12-10-08-23-09.pdf

[15]. Vikendra S., a. S. ((2013)). ANALYSING SPACE COMPLEXITY OF VARIOUS ENCRYPTION ALGORITHMS. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue , 414-419.

[16]. Yogesh K., R. M. (Oct 2011). Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures. IJCSMS International Journal of Computer Science and Management Studies, Vol. 11, Issue 03, ISSN (Online): 2231-5268, 60-63.