CFP last date
20 September 2024
Reseach Article

A Novel Feistel-based Cryptosystem for Text Encryption

by Akhil Kaushik, Satvika
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 26
Year of Publication: 2024
Authors: Akhil Kaushik, Satvika
10.5120/ijca2024923736

Akhil Kaushik, Satvika . A Novel Feistel-based Cryptosystem for Text Encryption. International Journal of Computer Applications. 186, 26 ( Jul 2024), 23-26. DOI=10.5120/ijca2024923736

@article{ 10.5120/ijca2024923736,
author = { Akhil Kaushik, Satvika },
title = { A Novel Feistel-based Cryptosystem for Text Encryption },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2024 },
volume = { 186 },
number = { 26 },
month = { Jul },
year = { 2024 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number26/a-novel-feistel-based-cryptosystem-for-text-encryption/ },
doi = { 10.5120/ijca2024923736 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-07-09T00:35:21.281281+05:30
%A Akhil Kaushik
%A Satvika
%T A Novel Feistel-based Cryptosystem for Text Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 26
%P 23-26
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Ever since the internet was employed for commercial applications, it has become unsafe place for exchanging data. The mission critical data of any organization needs a security mechanism which can guard against malicious attacks. Most of these security problems are intentionally caused by notorious people trying to gain some financial benefit or harm someone. Every organization utilizes some kind of safety measures to avoid access to unauthorized users like firewalls, proxy servers, access lists, antiviruses etc. Other important application layer security mechanisms that are widely used are cryptography and steganography. Steganography can be described as the technique for hiding a secret message within a larger one such that no one except the sender and receiver suspects the contents or even the existence of the hidden message. On the contrary, cryptography deals with altering the message contents such that they become meaningless if anyone intercepts them while transmission. In this paper, a novel text cryptographic algorithm named FBC Cryptosystem have been proposed for meeting the requirements of secure data transfer. The proposed algorithm is also compared to the de-facto encryption standards to foresee its performance and security aspects. It is found out that the proposed algorithm is a secure and proficient way for data encryption.

References
  1. J. F. Dooley, “History of cryptography and cryptanalysis, History of Computing”, 2018.
  2. “Basic Cryptographic Algorithms”, an article available atwww.itsc.state.md.us/oldsite/info/internetSecurity/Crypto/Cry-ptoIntro.htm#Algorithms.
  3. A. Biryukov, G. Leurent, and L. Perrin, “Cryptanalysis of Feistel networks with secret round functions”, In International Conference on Selected Areas in Cryptography (pp. 102-121), Cham: Springer International Publishing, August, 2015.
  4. D. Bujari, and A. Erke, “Comparative analysis of block cipher modes of operation”, In International Advanced Researches & Engineering Congress, 2017.
  5. N. Kaaniche, and M. Laurent, “Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms”, Computer Communications, 111, pp. 120-141, 2017.
  6. B. Bhushan, G. Sahoo, and A. K. Rai, “Man-in-the-middle Attack in Wireless and Computer Networking—A Review”, In 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA), pp. 1-6, 2017.
  7. M. Usman, I. Ahmed, M. I. Aslam, S. Khan, and U. A. Shah, “SIT: a lightweight encryption algorithm for secure internet of things”, arXiv preprint arXiv:1704.08688, 2017.
  8. S.R. Kimbleton & G.M. Schneider, “Computer communications networks: approaches, objectives and performance considerations”, ibid., pp. 129-173, 1975.
  9. A. Hoehn, and P. Zhang, “Detection of replay attacks in cyber-physical systems”, In 2016 American control conference (ACC), pp. 290-295, 2016.
  10. V. K. Pachghare, “Cryptography and Information Security”, PHI Learning Pvt. Ltd, 2019.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Decryption Encryption Key Feistel Based Cryptosystem Symmetric key algorithm