Design and Development of New Cryptography Protocol  
  Authors : Gajendra Singh; Preeti Shukla

 

The world it knows today would be impossible without cryptography. This Paper is presenting study of cryptography and problem associating with existing encryption model is also presented. Furthermore this is proposing encryption model. This encryption model is based on the stream cipher concept where it will be encrypt and decrypt any type of data file in bit wise way. The primary goal of this paper is to improve level of security. The proposed encryption model will analyze by using a parameter called Avalanche effect. Plaintext and encryption key are mapped in binary code before encryption process. Avalanche Effect is calculated by changing one bit in plaintext keeping the key constant and by changing one bit in encryption key keeping the key constant. Expected experimental results shows that the proposed encryption model exhibit significant high. Avalanche Effect will improve the level of the security.

 

Published In : IJCAT Journal Volume 1, Issue 10

Date of Publication : 30 November 2014

Pages : 498 - 501

Figures :04

Tables : 03

Publication Link : Design and Development of New Cryptography Protocol

 

 

 

Gajendra Singh : C.S (Department) SSSIST Sehore (M.P), R.G.P.V, Bhopal, M.P, India

Preeti Shukla : M.Tech. Scholar SSSIST Sehore (M.P), R.G.P.V, Bhopal, M.P, India

 

 

 

 

 

 

 

Encryption

Decryption

Security

Model

Cryptography

Key

The proposed encryption model, presented in this paper is very simple to understand and it will easy to implement. The 128 bits key length for any particular file which will certainly enhance the security features. Expected outcome section indicates that the proposed encryption model is definitely comparable with existing encryption model. The performance of Proposed Encryption model will significantly better than other encryption model. For large files, proposed encryption model will be very suitable. The proposed encryption model will be applicable to ensure high security in transmission of any file of any size.

 

 

 

 

 

 

 

 

 

[1] Aasifhasan, Neeraj Sharma “A New Method Towards Encryption Schemes (N Ame-Based-Encryption Algorithm)” Published In IEEE International Conference On Reliability, Optimization And Information Technology -ICROIT 2014, India, PP 310-313 Feb 6-8 2014 [2] Xinqiang Li, Lili Yu, Lihuan Wei “The Application Of Hybrid Encryption Algorithm In Software Security” Published In IEEE International Conference PP 669-672, 2013 [3] Hanan A. Al-Souly, Abeer S. Al-Sheddi, Heba A. Kurdi “Enhanced TSFS Algorithm For Secure Database Encryption” Published In IEEE Science And Information Conference October 7-9, 2013 | London, UK PP 328-334 [4] Yash Bharadwaj, Shampa Chakraverty “A Design Pattern For Symmetric Encryption” Published In IEEE International Conference On Control, Computing, Communication And Materials (ICCCCM)2013 Pp 1-6 [5] A.Ramesh, Dr.A.Suruliandi “Performance Analysis Of Encryption Algorithms For Information Security” Published In IEEE International Conference On Circuits, Power And Computing Technologies [ICCPCT-2013] Pp 840-844 [6] Rahul Deep Sircar, Gunjan Sekhon, Asoke Nath “Modern Ecryption Standard (MES) : Version-II” IEEE International Conference on Communication Systems and Network Technologies 2013PP 506-511 [7] Gurpreet Singh, Supriya “Modified Vigenere Encryption Algorithm and its Hybrid Implementation with Base64 and AES” published in Second IEEE International Conference on Advanced Computing, Networking and Security 2013 PP 232-237 [8] Mr. Ramesh Shahabadkar, Dr. Ramachandra V. Pujeri “Optimization of Encryption Technique using Evolutionary Algorithm for Protecting Multimedia Contents in P2P System” published in 4th IEEE ICCCNT - July 4-6, 2013, Tiruchengode, India PP 256-261 [9] Songsheng Tang, Fuqiang Liu Nath “A one-time pad encryption algorithm based on oneway hash and conventional block cipher” published IEEE, June 2012. [10] Chandra Prakash, Dewangan, Shashikant Agrawal “A Novel Approach to Improve Avalanche Effect of AES Algorithm” International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 8, October 2012 ISSN: 2278 – 1323 [11] Irfan.Landge, Burhanuddin Contractor, Aamna Patel and Rozina Choudhary “ Image encryption and decryption using blowfish algorithm” World Journal of Science and Technology 2012, 2(3):151-156 ISSN: 2231 – 2587 [12] An Integrated Symmetric key Cryptography Algorithm using Generalised modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm : Debanjan Das, Joyshree Nath, Megholova Mukherjee, Neha Choudhary, Asoke Nath: Communicated for publication in IEEE International conference WICT 2011 to be held at Mumbai Dec 11-14, 2011. [13] Symmetric Key Cryptography using Random Key generator : Asoke Nath, Saima Ghosh, Meheboob Alam Mallik: “Proceedings of International conference on security and management(SAM’10” held at Las Vegas, USA Jul 12-15, 2010), P-Vol-2, 239-244(2010). [14] David Kahn, "The Code Breakers: The Story of Secret Writing," Simon & Schuster, 1996 [15] Simon Singh, "The Code Book," Anchor Books, 1999 [16] Robert Reynard “Secret Code Breaker II: A Cryptanalyst's Handbook.” , 1997 [17] David Mertz, “Introduction to cryptology, Part 1:” 2001 [18] Shivangi Goyal “A Survey on the Applications of Cryptography” published in International Journal of Science and Technology Volume 1 No. 3, March , 2012 PP 137-140 available at http://www.journalofsciencestechnology. org/archive/2012/march_vol_1_no_3/9685 431326187 843.pdf [19] Saranya K, Mohanapriya R, Udhayan J “A Review on Symmetric Key Encryption Techniques in Cryptography” published in International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 3, March 2014 539 ISSN: 2278 – 7798 PP 539-544 available at http://ijsetr.org/wp-content/uploads/2014/03/IJSETRVOL- 3-ISSUE-3-539-544.pdf