CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Parallel Key Encryption for CBC and Interleaved CBC

by S.Ashokkumar, K.Karuppasamy, Balaji Srinivasan, V.Balasubramanian
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 2 - Number 1
Year of Publication: 2010
Authors: S.Ashokkumar, K.Karuppasamy, Balaji Srinivasan, V.Balasubramanian
10.5120/616-867

S.Ashokkumar, K.Karuppasamy, Balaji Srinivasan, V.Balasubramanian . Parallel Key Encryption for CBC and Interleaved CBC. International Journal of Computer Applications. 2, 1 ( May 2010), 21-25. DOI=10.5120/616-867

@article{ 10.5120/616-867,
author = { S.Ashokkumar, K.Karuppasamy, Balaji Srinivasan, V.Balasubramanian },
title = { Parallel Key Encryption for CBC and Interleaved CBC },
journal = { International Journal of Computer Applications },
issue_date = { May 2010 },
volume = { 2 },
number = { 1 },
month = { May },
year = { 2010 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume2/number1/616-867/ },
doi = { 10.5120/616-867 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:49:37.151014+05:30
%A S.Ashokkumar
%A K.Karuppasamy
%A Balaji Srinivasan
%A V.Balasubramanian
%T Parallel Key Encryption for CBC and Interleaved CBC
%J International Journal of Computer Applications
%@ 0975-8887
%V 2
%N 1
%P 21-25
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In current day scenario, the need to protect information has become very important and hence the need for cryptographic algorithms is high. Here, we extend the parallel key encryption algorithm and bring out its full potential by implementing the various cryptographic modes such as cipher block chaining and interleaved cipher block chaining where commendable increase in efficiency and reduction in encryption and decryption time can be seen. We have also considerably increased the key size by using 1024 bit and 2048 bit keys for the algorithmic implementation and in CBC and interleaved CBC execution. Our practical analysis has brought to front the salient features of the parallel key encryption algorithm and its ability to provide enhanced data protection when using a larger key size along with its randomness property. In theoretical analysis, it can be shown that remarkable reduction in encryption and decryption time of cryptographic systems is achieved and an enhanced strength to the system against brute force attacks is achieved. Furthermore, PCA can be extended for different cryptographic modes, using varying key size and number of keys used in the process.

References
  1. Thongpon Teerakonak,Sinchai KamolPhiwong “Accelerating Asymmetric key cryptography using Parallel Key Cryptographic Algorithm (PCA)”
  2. Applied Cryptography, Bruce Schneider, second edition john wiley & sons, 1996
  3. http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation
  4. http://en.wikipedia.org/wiki/RSA
  5. Yun Chen, Xin Chen, YiMu, “A parallel key generation algorithm for efficient Diffie- Hellmann key agreement”,IEEE transaction on information theory, 1-4244-0605-6/06.
  6. Ying Wang, Chunyan Han and Yuanyi Liu, “A Parallel Encryption Algorithm for Color Images Based on Lorenz Chaotic Sequences”, IEEE transaction on information Theory, 1-4244-0332-4/06, pp.9744- 9747,2006
  7. Boneh, D.; Durfee, G., “Cryptanalysis of RSA with private key d less than N0.292”, IEEE Transactions on Information Theory, Volume 46, Issue 4, Jul 2000 pp.1339 – 1349
  8. Praveen Dongara and T. N. Vijaykumar, “Accelerating Private-Key Cryptography via Multithreading on Symmetric Multiprocessors”, Proceeding of IEEE Int'l Symposium. Performance Analysis of Systems and Software (ISPASS 03), IEEE Press, 2003, pp. 58-69.
  9. Behrouz A. Forouzan, Cryptography and Network Security, McGraw- Hill International Edition, 2008
  10. David Bishop, Introduction to Cryptography with java applets,jones and barlett publishers inc.,2002
  11. Andrej Dujella, “Cryptanalysis A variant of Wiener's attack on RSA with small secret exponent”, ACM Communications in Computer Algebra, Volume 42 , Issue 1-2 (March/June 2008), pp. 50-51, 2008
  12. David Pointcheval, Jacques Stern, “Security Proofs for Signature Schemes”, E’cole Normale Supe’rieure Laboratoire d’informatique, 45, rue d’Ulm, 75230 Paris Cedex 05
  13. Benoˆit Libert, Jean-Jacques Quisquater, and Moti Yung, “Parallel Key- Insulated Public Key Encryption Without Random Oracles”, UCL, Micorelectronics Laboratory, Crypto Group (Belgium) and RSA Labs and Columbia University (USA)
  14. Boneh, D., “Twenty Years of Attacks on the RSA Cryptosystem”, Notice of the AMS, 46: 2003-2013
Index Terms

Computer Science
Information Sciences

Keywords

parallel key encryption cipher block chaining CBC interleaved CBC ICBC RSA