A Symmetric Key Cryptographic Technique Based on Frame Rotation of an Even Ordered Square Matrix

被引:0
|
作者
Goswami , Joyita [1 ]
Paul, Manas [1 ]
机构
[1] JIS Coll Engn, Deptartment Comp Applicat, Kalyani, W Bengal, India
关键词
FRSM; AES; Triple DES; Session based key; Avalanche; Strict avalanche; Bit independence; Chi-square;
D O I
10.1007/978-81-322-2250-7_31
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A session based symmetric key cryptographic technique has been proposed in this paper. It considered the plain text as a stream of finite number of binary bits. Using frame rotation technique of square matrix, input bits are oriented to generate cipher text. A session key is generated from the plain text information. Results are generated to compare the proposed technique with Triple-DES (168 bits), AES (128 bits) with respect to different parameters.
引用
收藏
页码:319 / 328
页数:10
相关论文
共 38 条
  • [1] SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM BASED ON LOGARITHMIC FUNCTION
    Nema, Preksha
    Rizvi, M. A.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 757 - 762
  • [2] Software Metric LOC Data Analysis for Symmetric Key Cryptographic Technique
    Dhanuja, B.
    Sathiya, G.
    2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,
  • [3] Cryptographic Technique by Square Matrix and Single Point Crossover on Binary Field
    Som, Subhranil
    Banerjee, Mandira
    2013 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS SIGNAL PROCESSING, AND THEIR APPLICATIONS (ICCSPA'13), 2013,
  • [4] RASS - A Concurrency Based Bitwise Symmetric Key Cryptographic Algorithm
    Roy, Abhriya
    Ray, Ronit
    De, Saptarshi
    Guha, Shalini
    Goswami, Sukalyan
    Basak, Ratan Kumar
    Mukhopadhyay, Bipasha
    Chatterjee, Souvik
    Zaman, Amrin
    Nag, Sucheta
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [5] A Symmetric Key Cryptographic Encryption Technique of MPEG Digital Video Images Based on RGB Pixel Transposition and Shuffling
    Kester, Quist-Aphetsi
    Nana, Laurent
    Pascu, Anca Christine
    Gire, Sophie
    Eghan, Jojo M.
    Quaynor, Nii Narku
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (04): : 192 - 199
  • [6] BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing
    Sohal, Manreet
    Sharma, Sandeep
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (01) : 1417 - 1425
  • [7] A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme
    Huang, Yi-Li
    Leu, Fang-Yie
    Sheu, Ruey-Kai
    Liu, Jung-Chun
    Susanto, Heru
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (18):
  • [8] Cloud Security Architecture Based on User Authentication and Symmetric Key Cryptographic Techniques
    Wani, Abdul Raoof
    Rana, Q. P.
    Pandey, Nitin
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 529 - 534
  • [9] The analysis and implementation of the symmetric key cryptographic algorithm based on the algebraic Paley graphs
    Oumazouz, Zhour
    Karim, Driss
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2022, 17 (04): : 1563 - 1567
  • [10] Symmetric Key Encryption Based on Rotation-Translation Equation
    Stoyanov, Borislav
    Nedzhibov, Gyurhan
    SYMMETRY-BASEL, 2020, 12 (01): : 2 - 12