Algebra Based Encryption and Decryption Algorithms
DOI:
https://doi.org/10.21015/vtm.v10i1.1188Abstract
In this study an encryption/decryption algorithm is proposed and developed. The developed algorithm is based on the idea that any given plain text can be encrypted like a block cipher with a combination of three encryption keys k1, K2, ...KN that use any value between N = 1, 2, 3, n, . Then the cipher values can be used to make the blocks of alphabets containing only A, B, C, D, E, F, G, H, I, J, each block is separated by a space. The steps of algorithm could also be reversible for decryption of the cipher text. A MATLAB code is written to implement the algorithm and tested different input messages.Secret message consists of websitelink and bank account details. The specialty of the algorithm is that it can be flexibly used to encrypt and decrypt the secret messages containing not only English alphabets but also those messages containing the numbers, punctuations, elementary mathematics operations and the special characters. The performance of the algorithm is evaluated in terms of computational time, memory usage. From the analysis it is found that the proposed algorithm is faster in terms of execution time as compared to the modern algorithm which makes the algorithm computationally
secure. The proposed research particularly contributes as the addition of knowledge in the field of cryptography and generally to the information security; consequently can be beneficial to the society.
3
References
Sharma, S.J., The Art of Cryptography: From Ancient Number System to Strange Number System. International Journal of Application or Innovation in Engineering and management (IJAIEM), ISSN, pp.23194847.
Wasnik, T.P., Patil, V.S., Patinge, S.A., Dave, S.R. and Sayasikamal, G.J., 2013. Cryptography as an instrument to network security||. International Journal of Application or Innovation in Engineering Management (IJAIEM), 2(3), pp.72-80.
Al-Vahed, A. and Sahhavi, H., 2011. An overview of modern cryptography. World Applied Programming, 1(1), pp.55-61.
Ritu Tripathi, and Sanjay Agrawal., (2014). Comparative Study of Symmetric and Asymmetric Cryptography Techniques International Journal of Advance Foundation and Research in Computer (IJAFRC), 1(6), pp. 68-76.
Alam, M.I. and Khan, M.R., 2013. Performance and efficiency analysis of different block cipher algorithms of symmetric key cryptography. International Journal of Advanced Research in Computer Science and Software Engineering, 3(10), pp.713-720.
Suguna, S., Dhanakoti, V. and Manjupriya, R., 2016. A study on symmetric and asymmetric key encryption algorithms. Int Res J Eng Technol (IRJET), 3(4), pp.27-31.
Kumari, S., 2017. A research paper on cryptography encryption and compression techniques. International Journal Of Engineering And Computer Science, 6(4), pp.20915-20919.
AbuTaha, M., Farajallah, M., Tahboub, R. and Odeh, M., 2011. Survey paper: cryptography is the science of information security.
Thambiraja, E., Ramesh, G. and Umarani, D.R., 2012. A survey on various most common encryption techniques. International journal of advanced research in computer science and software engineering, 2(7).
Poonia, P. and Kantha, P., 2016. Comparative Study of Various Substitution and Transposition Encryption Techniques. Int. J. Comput. Appl, 145(10), pp.24-27.
Kenang Eko Prasetyol, Tito Waluyo Purboyo, and Randy Erfa Saputra,(2017). A Survey on Data Comparison and Cryptography Algorithms International Journal of Applied Engineering Research (IJAER), 12(23), pp. 13589-13595.
Shyam Nandan Kumar. Review on Network Security and Cryptography International Transaction of Electrical and Computer Engineers System (ITECE), Vol. 3, No. 1, ISSN (Online) 2373-1281 and ISSN (Print) 2373- 1273, (2015) pp.1-11.
Saranya, K., Mohanapriya, R. and Udhayan, J., 2014. A review on symmetric key encryption techniques in cryptography. International Journal of Science, Engineering and Technology Research (IJSETR), 3(3), pp.539-544.
Mohan, M., Devi, M.K. and Prakash, V.J., 2015. Security analysis and modification of classical encryption scheme. Indian journal of science and technology, 8(8), pp.542-548.
Kendhe, A.K. and Agrawal, H., 2013. A survey report on various cryptanalysis techniques. International Journal of Soft Computing and Engineering (IJSCE), 3(2), pp.287-293.
Dave, K.T., 2013. Brute-force Attack ‘Seeking but Distressing’. Int. J. Innov. Eng. Technol. Brute-force, 2(3), pp.75-78.
Mandal, P.C., 2012. Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish. Journal of Global Research in Computer Science, 3(8), pp.67-70.
Mahajan, P. and Sachdeva, A., 2013. A study of encryption algorithms AES, DES and RSA for security. Global Journal of Computer Science and Technology.
Masram, R., Shahare, V., Abraham, J. and Moona, R., 2014. Analysis and comparison of symmetric key cryptographic algorithms based on various file features. International Journal of Network Security Its Applications, 6(4), p.43.
Rusia, M.K. and Rusia, M., 2017. A literature survey on efficiency and security of symmetric cryptography. Intern. J. of Comp. Sci. and Network, 6(3), pp.425-429.
Mathur, H., 2015. Prof. Zahid Alam,” Analysis In Symmetric And Asymmetric Cryptology Algorithm”. International Journal of Emerging Trends Technology in Computer Science, 4(1), pp.44-47.
Karthik, S. and Muruganandam, A., 2014. Data Encryption and Decryption by using Triple DES and performance analysis of crypto system. International Journal of Scientific Engineering and Research, 2(11),
pp.24-31.
Zoran Herigonja, 2016. Comparative Analysis of Cryptographic Algorithms International Journal of
Digital Technology and Economy (IJDTE),1(2), pp. 127-134.
More, S., 2015. Implementation of AES with Time Complexity Measurement for Various Input.
Global Journal of Computer Science and Technology, 15(E4), pp.11-20.
B.Bharathi, G.Manivasagam, and M. Anand Kumar, 2017. Metrics for Performance Evaluation of Encryption
Algorithms International Journal of Advance Research in Science and Engineering (IJARSE),6(3)pp.
-72.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-By) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This work is licensed under a Creative Commons Attribution License CC BY