The world it knows today would be impossible
without cryptography. This Paper is presenting study of
cryptography and problem associating with existing encryption
model is also presented. Furthermore this is proposing encryption
model. This encryption model is based on the stream cipher
concept where it will be encrypt and decrypt any type of data file
in bit wise way. The primary goal of this paper is to improve
level of security. The proposed encryption model will analyze by
using a parameter called Avalanche effect. Plaintext and
encryption key are mapped in binary code before encryption
process. Avalanche Effect is calculated by changing one bit in
plaintext keeping the key constant and by changing one bit in
encryption key keeping the key constant. Expected experimental
results shows that the proposed encryption model exhibit
significant high. Avalanche Effect will improve the level of the
security.
Published In : IJCAT Journal Volume 1, Issue 10
Date of Publication : 30 November 2014
Pages : 498 - 501
Figures :04
Tables : 03
Publication Link : Design and Development of New Cryptography
Protocol
Gajendra Singh : C.S (Department) SSSIST Sehore (M.P), R.G.P.V, Bhopal, M.P, India
Preeti Shukla : M.Tech. Scholar SSSIST Sehore (M.P), R.G.P.V, Bhopal, M.P, India
Encryption
Decryption
Security
Model
Cryptography
Key
The proposed encryption model, presented in this paper is
very simple to understand and it will easy to implement.
The 128 bits key length for any particular file which will
certainly enhance the security features. Expected outcome
section indicates that the proposed encryption model is
definitely comparable with existing encryption model. The
performance of Proposed Encryption model will
significantly better than other encryption model. For large
files, proposed encryption model will be very suitable. The
proposed encryption model will be applicable to ensure
high security in transmission of any file of any size.
[1] Aasifhasan, Neeraj Sharma “A New Method Towards
Encryption Schemes (N Ame-Based-Encryption
Algorithm)” Published In IEEE International
Conference On Reliability, Optimization And
Information Technology -ICROIT 2014, India, PP
310-313 Feb 6-8 2014
[2] Xinqiang Li, Lili Yu, Lihuan Wei “The Application Of
Hybrid Encryption Algorithm In
Software Security” Published In IEEE International
Conference PP 669-672, 2013
[3] Hanan A. Al-Souly, Abeer S. Al-Sheddi, Heba A.
Kurdi “Enhanced TSFS Algorithm For Secure
Database Encryption” Published In IEEE Science And
Information Conference October 7-9, 2013 | London,
UK PP 328-334
[4] Yash Bharadwaj, Shampa Chakraverty “A Design
Pattern For Symmetric Encryption” Published In IEEE
International Conference On Control, Computing,
Communication And Materials (ICCCCM)2013 Pp 1-6
[5] A.Ramesh, Dr.A.Suruliandi “Performance Analysis Of
Encryption Algorithms For Information Security”
Published In IEEE International Conference On
Circuits, Power And Computing Technologies
[ICCPCT-2013] Pp 840-844
[6] Rahul Deep Sircar, Gunjan Sekhon, Asoke Nath
“Modern Ecryption Standard (MES) : Version-II”
IEEE International Conference on Communication
Systems and Network Technologies 2013PP 506-511
[7] Gurpreet Singh, Supriya “Modified Vigenere
Encryption Algorithm and its Hybrid Implementation
with Base64 and AES” published in Second IEEE
International Conference on Advanced Computing,
Networking and Security 2013 PP 232-237
[8] Mr. Ramesh Shahabadkar, Dr. Ramachandra V. Pujeri
“Optimization of Encryption Technique using
Evolutionary Algorithm for Protecting Multimedia
Contents in P2P System” published in 4th IEEE
ICCCNT - July 4-6, 2013, Tiruchengode, India PP
256-261
[9] Songsheng Tang, Fuqiang Liu Nath “A one-time pad
encryption algorithm based on oneway hash and
conventional block cipher” published IEEE, June 2012.
[10] Chandra Prakash, Dewangan, Shashikant Agrawal “A
Novel Approach to Improve Avalanche Effect of AES
Algorithm” International Journal of Advanced
Research in Computer Engineering & Technology
Volume 1, Issue 8, October 2012 ISSN: 2278 – 1323
[11] Irfan.Landge, Burhanuddin Contractor, Aamna Patel
and Rozina Choudhary “ Image encryption and
decryption using blowfish algorithm” World Journal of
Science and Technology 2012, 2(3):151-156 ISSN:
2231 – 2587
[12] An Integrated Symmetric key Cryptography Algorithm
using Generalised modified Vernam Cipher method
and DJSA method: DJMNA symmetric key algorithm :
Debanjan Das, Joyshree Nath, Megholova Mukherjee,
Neha Choudhary, Asoke Nath: Communicated for
publication in IEEE International conference WICT
2011 to be held at Mumbai Dec 11-14, 2011.
[13] Symmetric Key Cryptography using Random Key
generator : Asoke Nath, Saima Ghosh, Meheboob
Alam Mallik: “Proceedings of International conference
on security and management(SAM’10” held at Las
Vegas, USA Jul 12-15, 2010), P-Vol-2, 239-244(2010).
[14] David Kahn, "The Code Breakers: The Story of Secret
Writing," Simon & Schuster, 1996
[15] Simon Singh, "The Code Book," Anchor Books, 1999
[16] Robert Reynard “Secret Code Breaker II: A
Cryptanalyst's Handbook.” , 1997
[17] David Mertz, “Introduction to cryptology, Part 1:”
2001
[18] Shivangi Goyal “A Survey on the Applications of
Cryptography” published in International Journal of
Science and Technology Volume 1 No. 3, March ,
2012 PP 137-140 available at
http://www.journalofsciencestechnology.
org/archive/2012/march_vol_1_no_3/9685
431326187 843.pdf
[19] Saranya K, Mohanapriya R, Udhayan J “A Review on
Symmetric Key Encryption Techniques in
Cryptography” published in International Journal of
Science, Engineering and Technology Research
(IJSETR), Volume 3, Issue 3, March 2014 539 ISSN:
2278 – 7798 PP 539-544 available at
http://ijsetr.org/wp-content/uploads/2014/03/IJSETRVOL-
3-ISSUE-3-539-544.pdf