We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Dynamic Modular Cipher Cryptography Technique

by Syed Haroon Hasan, Zuber Farooqui
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 173 - Number 9
Year of Publication: 2017
Authors: Syed Haroon Hasan, Zuber Farooqui
10.5120/ijca2017915442

Syed Haroon Hasan, Zuber Farooqui . A Dynamic Modular Cipher Cryptography Technique. International Journal of Computer Applications. 173, 9 ( Sep 2017), 49-53. DOI=10.5120/ijca2017915442

@article{ 10.5120/ijca2017915442,
author = { Syed Haroon Hasan, Zuber Farooqui },
title = { A Dynamic Modular Cipher Cryptography Technique },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 173 },
number = { 9 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 49-53 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume173/number9/28366-2017915442/ },
doi = { 10.5120/ijca2017915442 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:20:51.230364+05:30
%A Syed Haroon Hasan
%A Zuber Farooqui
%T A Dynamic Modular Cipher Cryptography Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 173
%N 9
%P 49-53
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Modern Internet protocols support several modes of operation in encryption tasks for data confidentiality to keep up with varied environments and provide the various choices, such as multi-mode IPSec support. To begin with we will provide a brief introduction on the modes of operation for symmetric-key Module ciphers. Different Module cipher modes of operation have distinct characteristics. For example, the cipher Module chaining (CBC) mode is suitable for operating environments that require self-synchronizing capabilities, and the output feedback (OFB) mode requires encryption modules only. When using symmetric-key Module cipher algorithms such as the Advanced Encryption Standard (AES), users performing information encryption often encounter difficulties selecting a suitable mode of operation. This paper describes a structure for analyzing the Module operation mode combination. This unified operation structure (UOS) combines existing common and popular Module modes of operation. UOS does multi-mode of operation with most existing popular symmetric-key Module ciphers and do not only consist of encryption mode such as electronic codebook (ECB) mode, cipher Module chaining (CBC) mode, cipher feedback (CFB) mode and output feedback (OFB) mode, that provides confidentiality but also message authentication mode such as the cipher Module chaining message authentication code (CBC-MAC) in cryptography. In Cloud Computing, information exchange frequently via the Internet and on-demand. This research provides an overview and information useful for approaching low-resource hardware implementation, which is proper to ubiquitous computing devices such as a sensor mote or an RFID tag. The use of the method is discussed and an example is given. This provides a common solution for multimode and this is very suitable for ubiquitous computing with several resources and environments. This study indicates a more effectively organized structure for symmetric-key Module ciphers to improve their application scenarios. We can get that it is flexible in modern communication applications.

References
  1. Zeenat Mahmood,” Hybridize Dynamic Symmetric Key Cryptography using LCG”, International Journal of Computer Applications (0975 – 8887) Volume 60– No.17.
  2. Behrouz A. Forouzan,”Cryptography & Network Security” Tata McGraw Hill, ISBN 13-978-0-07-066046-5.
  3. M. Blaze, W. Diffie, R. L. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Wiener,” Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security”,Report of Ad Hoc Panel of Cryptographers and Computer Scientists, Jan. 1996.
  4. Ayushi, “ A Symmetric Key Cryptographic [Algorithm “International Journal of Computer Applications (0975 8887) Volume 1 – No. 15
  5. W. Diffie and M. E. Hellman, “New directions in cryptography, " IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976
  6. Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, and Balasubramaniam Srinivasan “Dynamic Key Cryptography and Applications “ International Journal of Network Security, Vol.10, No.3, PP.161{174, May 2010
  7. R. Divya & T. Thirumurugan, “A Novel Dynamic Key Management Scheme Based On Hamming Distance for Wireless Sensor Networks”, International Journal of Scientific & Engineering Research Volume 2, Issue 5, May- 2011,ISSN 2229-5518
  8. Yunpeng Zhang, Fei Zuo, Zhengjun Zhai and Cai Xiaobin. 2008. A New Image Encryption Algorithm Based on Multiple Chaos System. International Symposium on Electronic Commerce and Security. 347-350.
  9. Xukai Zou, Yogesh Karandikar and Elisa Bertino, “A Dynamic key management solution to access hierarchy”, International Journal of Network Management 2007; 17: 437- 450
  10. P. Hellekalek “Good random number generators are (not so) easy to find Mathematics and Computers in Simulation “46 (1998) 485±505
  11. Dr. Ranjan Bose and Amitabha Banerjee “IMPLEMENTING SYMMETRIC CRYPTOGRAPHY USING CHAOS FUNCTIONS”
  12. L. Law, A. Menezes, M. Qu, J. Solinas, S. Vanstone, “An effcient protocol for authenticated key agreement," Designs, Codes and Cryptography, vol. 28, no. 2, pp. 119-134, 2003
  13. http://www.pro-technix.com/information/crypto/pages/vernam_base.html
  14. http://www.cryptomuseum.com/crypto/otp.htm
  15. F. Sun, S. Liu, Z. Li and Z. Lü., 2008. A novel image encryption scheme based on spatial chaos map. Chaos, Solitons and Fractals, 38 (3), 631 – 640.
Index Terms

Computer Science
Information Sciences

Keywords

Symmetric key cryptography Encryption Decryption Dynamic secret key Cryptographic Pseudo-Random number generator Hybrid technique Transposition Substitution.