We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Introduction of a Triple Prime Symmetric Key Block Cipher

by Abhijit Chowdhury, Angshu Kumar Sinha, Saurabh Dutta
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 7
Year of Publication: 2012
Authors: Abhijit Chowdhury, Angshu Kumar Sinha, Saurabh Dutta
10.5120/4831-7089

Abhijit Chowdhury, Angshu Kumar Sinha, Saurabh Dutta . Introduction of a Triple Prime Symmetric Key Block Cipher. International Journal of Computer Applications. 39, 7 ( February 2012), 16-18. DOI=10.5120/4831-7089

@article{ 10.5120/4831-7089,
author = { Abhijit Chowdhury, Angshu Kumar Sinha, Saurabh Dutta },
title = { Introduction of a Triple Prime Symmetric Key Block Cipher },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 7 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 16-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number7/4831-7089/ },
doi = { 10.5120/4831-7089 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:25:48.814734+05:30
%A Abhijit Chowdhury
%A Angshu Kumar Sinha
%A Saurabh Dutta
%T Introduction of a Triple Prime Symmetric Key Block Cipher
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 7
%P 16-18
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes to put forward an innovative algorithm for symmetric key block cipher named as “Triple Prime Symmetric Key Block Cipher with Variable Key-Spaces (TPSKBCVK)” that employs triple prime integers as private key-spaces of varying lengths to encrypt data files. Principles of modular arithmetic have been elegantly used in the proposed idea of the cipher. Depending on observations of the results of implementation of the proposed cipher on a set of real data files of several types, all results are registered and analyzed. The strength of the underlying design of the cipher and the liberty of using a long key-space expectedly makes it reasonably non-susceptible against possible cryptanalytic intrusions. As a future scope of the work, it is intended to formulate and employ an improved scheme that will use a carrier media (image or multimedia data file) for a secure transmission of the private keys.

References
  1. James J. Tattersall – “Elementary Number Theory in Nine Chapters”, Cambridge University Press.
  2. Menezes, P. van Oorschot, and S. Vanstone – “Handbook of Applied Cryptography “, CRC Press, 1996.
  3. Bruce Schneier - “Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C”, Publisher: John Wiley & Sons, Inc.
  4. Clay S. Turner, Euler’s Totient Function and Public Key Cryptography - http://web.cs.du.edu/~ramki/courses/security/2011Winter/notes/RSAmath.pdf.
  5. MIRACL Library web link: - http://www.shamus.ie
  6. Saurabh Dutta - An Approach to Design New Efficient Encryption Techniques, ISBN: 978-3-8443-0082-6, Lap Lambert Academic Publishing, Germany.
  7. William Stallings – “Cryptography and Network Security Principles and Practices, Fourth Edition”, Prentice Hall
Index Terms

Computer Science
Information Sciences

Keywords

Data Security Cryptography Prime Number Block Cipher