CFP last date
20 January 2025
Reseach Article

An Unassailable Block Cipher Generation with an Extended PCC, Concerning a Large Alphanumeric Kay, Modular Arithmetic and Integral Functions

by Prof. Ravindra Babu Kallam, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 28 - Number 9
Year of Publication: 2011
Authors: Prof. Ravindra Babu Kallam, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu
10.5120/3414-4764

Prof. Ravindra Babu Kallam, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu . An Unassailable Block Cipher Generation with an Extended PCC, Concerning a Large Alphanumeric Kay, Modular Arithmetic and Integral Functions. International Journal of Computer Applications. 28, 9 ( August 2011), 31-38. DOI=10.5120/3414-4764

@article{ 10.5120/3414-4764,
author = { Prof. Ravindra Babu Kallam, Dr. S.Udaya Kumar, Dr. A.Vinaya Babu },
title = { An Unassailable Block Cipher Generation with an Extended PCC, Concerning a Large Alphanumeric Kay, Modular Arithmetic and Integral Functions },
journal = { International Journal of Computer Applications },
issue_date = { August 2011 },
volume = { 28 },
number = { 9 },
month = { August },
year = { 2011 },
issn = { 0975-8887 },
pages = { 31-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume28/number9/3414-4764/ },
doi = { 10.5120/3414-4764 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:14:21.555834+05:30
%A Prof. Ravindra Babu Kallam
%A Dr. S.Udaya Kumar
%A Dr. A.Vinaya Babu
%T An Unassailable Block Cipher Generation with an Extended PCC, Concerning a Large Alphanumeric Kay, Modular Arithmetic and Integral Functions
%J International Journal of Computer Applications
%@ 0975-8887
%V 28
%N 9
%P 31-38
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this investigation, we have developed an unbreakable block cipher with extended play color cipher algorithm. This includes multiple transpositions, substitutions, modular arithmetic, integral functions and a 32 characters alphanumeric key. These functions mutate the plain text in various ways before it takes the shape of cipher text. The process of encryption, decryption and the sub key generation method were explained with example. The avalanche effect and the cryptanalysis examined in this analysis clearly indicate that the cipher is very strong one.

References
  1. Ravindra Babu K, Dr. S. Udaya Kumar, A Survey on Cryptography and Steganography Methods for Information Security, IJCA, Volume-12, No-2, November 2010
  2. Ravindra Babu K, Dr. Udaya kumar, Dr. A.Vinaya Babu, An Improved Playfair Cipher Cryptographic Substitution Algorithm, IJARCS, Volume 2, No-1, Jan-Feb 2011.
  3. Ravindra Babu K, Dr. Udaya Kumar, A contemporary poly alphabetic cipher using comprehensive vigenere table, WCSIT, Vol 1, No 4, 167-171, 2011.
  4. Lt. Ravindra Babu Kallam, Dr. S.Udaya Kumar, A Block Cipher generation using Color Substitution, IJCA, 2010 Vol 1, No-28.
  5. Ravindra Babu K, Dr. S.Udaya Kumar, Dr.A.Vinaya Babu, A new frame work for scalable secure block cipher generation using color substitution and permutation on characters, numbers, images and diagrams, IJCA, Vol 20.No 5,April 2011.
  6. Ravindra Babu K, Dr. S.Udaya Kumar, Dr.A.Vinaya Babu, A more secure block cipher generation involving multiple transposition and substitution with a large key, IJARCS, Vol 2, Mar-April 2011.
  7. Ravindra Babu K, Dr. S.Udaya Kumar, Dr.A.Vinaya Babu, A modern PCC involving dynamic permuted key with iterative and modular arithmetic functions, IJARCS,Vol 2, No 3, May-June 2011
  8. Ravindra Babu K, Dr. S.Udaya Kumar, Dr.A.Vinaya Babu, A variable length block cipher generation using modern PCC algorithm with alphanumeric key and iterative functions, accepted for the conference ICNICT-11, Sep 2011.
  9. William Stallings, Cryptography and Network Security, Principles and practice, 5th edition, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Symmetric block cipher Cryptanalysis Play color cipher (PCC) Substitution Permutation RSA algorithm Rich text format (RTF) PUB: Public key of user B PRA: Private Key of user A PUA: Public key of user A PRB: Private key of user B