CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Text Encryption Algorithms based on Pseudo Random Number Generator

by Mina Mishra, V.h. Mankar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 2
Year of Publication: 2015
Authors: Mina Mishra, V.h. Mankar
10.5120/19507-0756

Mina Mishra, V.h. Mankar . Text Encryption Algorithms based on Pseudo Random Number Generator. International Journal of Computer Applications. 111, 2 ( February 2015), 1-6. DOI=10.5120/19507-0756

@article{ 10.5120/19507-0756,
author = { Mina Mishra, V.h. Mankar },
title = { Text Encryption Algorithms based on Pseudo Random Number Generator },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 2 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number2/19507-0756/ },
doi = { 10.5120/19507-0756 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:46:46.733151+05:30
%A Mina Mishra
%A V.h. Mankar
%T Text Encryption Algorithms based on Pseudo Random Number Generator
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 2
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents algorithms for encryption and decryption developed using pseudo random number generator (PRNG) and non-Linear functions. PRNG used in the work are matlab random number generator (RNG) and Linear congruential generator (LCG). The developed algorithms are named according to PRNG used in it. State of PRNG is considered as secret key of the cipher. The encryption schemes have been cryptanalyzed for four different methods to test its strength like key space analysis, plaintext and key sensitive test. Known plaintext attack is also performed by taking into consideration a small string of plaintext and the complete cipher text for small text. The analysis is performed on different keys selected randomly from key space for various texts and files. Key sensitivity up to 50 % and plaintext sensitivity ranging from 3% to 50 % have been obtained in the developed ciphers. It is concluded that proposed encryption algorithms have strength against linear, differential and statistical attacks.

References
  1. L. P. de Oliveira and M. Sobottka, 2008, "Cryptography with chaotic mixing" Chaos, Solitons and Fractals, vol. 35, pp. 466–471.
  2. Ruming Yin, Jian Yuan, Qiuhua Yang, Xiuming Shan, Xiqin Wang, 2009," Linear cryptanalysis for a chaos-based stream cipher," World Academy of Science, Engineering and Technology ,60, 799-804.
  3. Xianfeng Guo, Jiashu Zhang, Xianfeng Guo, 2010," An Efficient Cryptanalysis of a Chaotic Cryptosystem and Its Improvement", IEEE conference on Information Theory and Information Security, China, 578-581.
  4. Jiantao zho, au, o. c, 2010, "cryptanalysis of chaotic convolutional coder ", proceedings of ieee symposium circuits and systems (iscas ) , 145-148.
  5. S. Li, X. Zheng, 2010, "Cryptanalysis of a chaotic image encryption method", Proceedings of the IEEE International. Symposium on circuits and systems, Scottsdale, AZ, USA.
  6. P. Xu; J. Zhao; D. Wang, 2011, "A selective image encryption algorithm based on hyper-chaos", IEEE 3rd International Conference on Communication Software and Networks (ICCSN), 2011, 376-379.
  7. Mishra Mina, Mankar V. H. , 2012, "Design and Analysis of Cipher Based on Henon and Burger Maps" Proceedings of IEEE 4th International Conference on Electronics Computer Technology (ICECT- 2012), 978-1-4673-1850, 466-471.
  8. Mishra Mina, Mankar V. H. , 2012, "A Chaotic encryption algorithm: Robustness against Brute-force attack" Advanced Intelligent and soft computing (AISC), Springer, 167, 169-179.
  9. Mishra Mina, Mankar V. H. ,2012, "Hybrid Message-Embedded cipher using logistic map" published in International Journal of Security, Privacy and Trust Management ( IJSPTM), 1(3/4), 81-91.
  10. Mishra Mina, Mankar V. H. , 2012, "Message Embedded cipher using 2-D Chaotic map" published in International Journal of Chaos, Control, Modelling and Simulation (IJCCMS), 1(1), 13-23, July 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Pseudo random number generator (PRNG) Random number generator Linear Congruential Generator.