Algebra Based Encryption and Decryption Algorithms

Shakeel Ahmed Kamboh, Suhail Aslam Khaskheli, Abbas Ali Ghoto, Sunny Kumar Aassori, Muzaffar Bashir Arain

Abstract


In this study an encryption/decryption algorithm is proposed and developed. The developed algorithm is based on the idea that any given plain text can be encrypted like a block cipher with a combination of three encryption keys k1, K2, ...KN that use any value between N = 1, 2, 3, n, . Then the cipher values can be used to make the blocks of alphabets containing only A, B, C, D, E, F, G, H, I, J, each block is separated by a space. The steps of algorithm could also be reversible for decryption of the cipher text. A MATLAB code is written to implement the algorithm and tested different input messages.Secret message consists of website
link and bank account details. The specialty of the algorithm is that it can be flexibly used to encrypt and decrypt the secret messages containing not only English alphabets but also those messages containing the numbers, punctuations, elementary mathematics operations and the special characters. The performance of the algorithm is evaluated in terms of computational time, memory usage. From the analysis it is found that the proposed algorithm is faster in terms of execution time as compared to the modern algorithm which makes the algorithm computationally
secure. The proposed research particularly contributes as the addition of knowledge in the field of cryptography and generally to the information security; consequently can be beneficial to the society.
3

Full Text:

PDF

References


Sharma, S.J., The Art of Cryptography: From Ancient Number System to Strange Number System. International Journal of Application or Innovation in Engineering and management (IJAIEM), ISSN, pp.23194847.

Wasnik, T.P., Patil, V.S., Patinge, S.A., Dave, S.R. and Sayasikamal, G.J., 2013. Cryptography as an instrument to network security||. International Journal of Application or Innovation in Engineering Management (IJAIEM), 2(3), pp.72-80.

Al-Vahed, A. and Sahhavi, H., 2011. An overview of modern cryptography. World Applied Programming, 1(1), pp.55-61.

Ritu Tripathi, and Sanjay Agrawal., (2014). Comparative Study of Symmetric and Asymmetric Cryptography Techniques International Journal of Advance Foundation and Research in Computer (IJAFRC), 1(6), pp. 68-76.

Alam, M.I. and Khan, M.R., 2013. Performance and efficiency analysis of different block cipher algorithms of symmetric key cryptography. International Journal of Advanced Research in Computer Science and Software Engineering, 3(10), pp.713-720.

Suguna, S., Dhanakoti, V. and Manjupriya, R., 2016. A study on symmetric and asymmetric key encryption algorithms. Int Res J Eng Technol (IRJET), 3(4), pp.27-31.

Kumari, S., 2017. A research paper on cryptography encryption and compression techniques. International Journal Of Engineering And Computer Science, 6(4), pp.20915-20919.

AbuTaha, M., Farajallah, M., Tahboub, R. and Odeh, M., 2011. Survey paper: cryptography is the science of information security.

Thambiraja, E., Ramesh, G. and Umarani, D.R., 2012. A survey on various most common encryption techniques. International journal of advanced research in computer science and software engineering, 2(7).

Poonia, P. and Kantha, P., 2016. Comparative Study of Various Substitution and Transposition Encryption Techniques. Int. J. Comput. Appl, 145(10), pp.24-27.

Kenang Eko Prasetyol, Tito Waluyo Purboyo, and Randy Erfa Saputra,(2017). A Survey on Data Comparison and Cryptography Algorithms International Journal of Applied Engineering Research (IJAER), 12(23), pp. 13589-13595.

Shyam Nandan Kumar. Review on Network Security and Cryptography International Transaction of Electrical and Computer Engineers System (ITECE), Vol. 3, No. 1, ISSN (Online) 2373-1281 and ISSN (Print) 2373- 1273, (2015) pp.1-11.

Saranya, K., Mohanapriya, R. and Udhayan, J., 2014. A review on symmetric key encryption techniques in cryptography. International Journal of Science, Engineering and Technology Research (IJSETR), 3(3), pp.539-544.

Mohan, M., Devi, M.K. and Prakash, V.J., 2015. Security analysis and modification of classical encryption scheme. Indian journal of science and technology, 8(8), pp.542-548.

Kendhe, A.K. and Agrawal, H., 2013. A survey report on various cryptanalysis techniques. International Journal of Soft Computing and Engineering (IJSCE), 3(2), pp.287-293.

Dave, K.T., 2013. Brute-force Attack ‘Seeking but Distressing’. Int. J. Innov. Eng. Technol. Brute-force, 2(3), pp.75-78.

Mandal, P.C., 2012. Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish. Journal of Global Research in Computer Science, 3(8), pp.67-70.

Mahajan, P. and Sachdeva, A., 2013. A study of encryption algorithms AES, DES and RSA for security. Global Journal of Computer Science and Technology.

Masram, R., Shahare, V., Abraham, J. and Moona, R., 2014. Analysis and comparison of symmetric key cryptographic algorithms based on various file features. International Journal of Network Security Its Applications, 6(4), p.43.

Rusia, M.K. and Rusia, M., 2017. A literature survey on efficiency and security of symmetric cryptography. Intern. J. of Comp. Sci. and Network, 6(3), pp.425-429.

Mathur, H., 2015. Prof. Zahid Alam,” Analysis In Symmetric And Asymmetric Cryptology Algorithm”. International Journal of Emerging Trends Technology in Computer Science, 4(1), pp.44-47.

Karthik, S. and Muruganandam, A., 2014. Data Encryption and Decryption by using Triple DES and performance analysis of crypto system. International Journal of Scientific Engineering and Research, 2(11),

pp.24-31.

Zoran Herigonja, 2016. Comparative Analysis of Cryptographic Algorithms International Journal of

Digital Technology and Economy (IJDTE),1(2), pp. 127-134.

More, S., 2015. Implementation of AES with Time Complexity Measurement for Various Input.

Global Journal of Computer Science and Technology, 15(E4), pp.11-20.

B.Bharathi, G.Manivasagam, and M. Anand Kumar, 2017. Metrics for Performance Evaluation of Encryption

Algorithms International Journal of Advance Research in Science and Engineering (IJARSE),6(3)pp.

-72.




DOI: http://dx.doi.org/10.21015/vtm.v10i1.1188

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.