CFP last date
20 January 2025
Reseach Article

Symmetric key Cryptography using two-way updated -Generalized Vernam Cipher method: TTSJA algorithm

by Trisha Chatterjee, Tamodeep Das, Shayan Dey, Joyshree Nath, Asoke Nath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 1
Year of Publication: 2012
Authors: Trisha Chatterjee, Tamodeep Das, Shayan Dey, Joyshree Nath, Asoke Nath
10.5120/5659-7550

Trisha Chatterjee, Tamodeep Das, Shayan Dey, Joyshree Nath, Asoke Nath . Symmetric key Cryptography using two-way updated -Generalized Vernam Cipher method: TTSJA algorithm. International Journal of Computer Applications. 42, 1 ( March 2012), 34-39. DOI=10.5120/5659-7550

@article{ 10.5120/5659-7550,
author = { Trisha Chatterjee, Tamodeep Das, Shayan Dey, Joyshree Nath, Asoke Nath },
title = { Symmetric key Cryptography using two-way updated -Generalized Vernam Cipher method: TTSJA algorithm },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 1 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number1/5659-7550/ },
doi = { 10.5120/5659-7550 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:24.278934+05:30
%A Trisha Chatterjee
%A Tamodeep Das
%A Shayan Dey
%A Joyshree Nath
%A Asoke Nath
%T Symmetric key Cryptography using two-way updated -Generalized Vernam Cipher method: TTSJA algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 1
%P 34-39
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the present paper the authors have introduced a new updated two-way generalized vernam cipher method called TTSJA. Chatterjee et. al developed a method [1] where they used three independent methods such as MSA [2], NJJSAA [3] and modified generalized vernam cipher method. Nath et al already developed some symmetric key methods [2,3,4,5] where they have used bit manipulation method and some randomized key matrix for encryption and decryption purpose. In the present work the authors have used updated generalized vernam cipher method in two directions. One from first character to last character and then we perform vernam method with XOR operation from last to first We found the results are quite satisfactory even for short message and repeated characters also. The advantage of the present method is that the overhead is minimum but the encryption is very hard. This method may be applied to encrypt short message such as SMS, password, ATM code etc. In the present work the authors have introduced updated Vernam Cipher method. The authors modified the standard Vernam Cipher method for all characters (ASCII code 0-255) with randomized keypad and also introduced feedback. After first phase encryption the modified vernam cipher method applied from last character to the first using random keypad and feedback. In the second phase instead of adding the keypad ASCII the authors performed the XOR with keypad and the encrypted text (after first phase). This method closely monitored on different known plain text and it was found that this method is almost unbreakable. The present method allows the multiple encryption and multiple decryption. To initiate the encryption process a user has to enter a text-key which may be maximum of 16 characters long. From the text- key the randomization number and the encryption number is calculated using a method proposed by Nath et al [2]. A minor change in the text-key will change the randomization number and the encryption number quite a lot. The present method is a block cipher method and it can be applied to encrypt confidential data in Defense system, Banking sector, mobile network, Short message Service, Password, ATM key etc. The advantage of the present method is that one can apply this method on top of any other standard algorithm such as MSA, DJSA, NJJSAA, TTJSA, DJMNA etc [2,4,3,1,5]. The method is suitable to encrypt any type of file.

References
  1. Symmetric key cryptosystem using combined cryptographic algorithms- generalized modified vernam cipher method, MSA method and NJJSAA method: TTJSA algorithm – Trisha Chatterjee, Tamodeep Das, Joyshree Nath, Shayan Dey and Asoke Nath, Proceedings of IEEE International conference: World Congress WICT-2011 held at Mumbai University 11-14 Dec, 2011, Page No. 1179-1184(2011)
  2. Symmetric key cryptography using random key generator, A. Nath, S. Ghosh, M. A. Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas(USA) 12-15 July,2010, Vol-2,P-239-244
  3. Advanced Symmetric key Cryptography using MSA method: DJSSA symmetric key algorithm, Dripto Chatterjee, Joyshree Nath, Soumitra Mondal, Suvadeep Dasgupta and Asoke Nath, Journal of Computing, Vol 3, issue 2, Page 66-71(Feb 2011).
  4. An Integrated symmetric key cryptography algorithm using generalized vernam cipher method and DJSA method: DJMNA symmetric key algorithm : Debanjan Das, Joyshree Nath, Megholova Mukherjee, Neha Chaudhury and Asoke Nath: Proceedings of IEEE International conference : World Congress WICT-2011 to be held at Mumbai University 11-14 Dec, 2011, Page No. 1203-1208(2011)
  5. Data Hiding and Retrieval, A. Nath, S. Das, A. Chakrabarti, Proceedings of IEEE International conference on Computer Intelligence and Computer Network held at Bhopal from 26-28 Nov, 2010.
  6. A new Symmetric key Cryptography Algorithm using extended MSA method :DJSA symmetric key algorithm, Dripto Chatterjee, Joyshree Nath, Suvodeep Dasgupta and Asoke Nath, IEEE conference CSNT-2011 held at SMVDU 03/06/2011 to 05/06/2011.
  7. Symmetric key Cryptography using modified DJSSA symmetric key algorithm, Dripto Chatterjee, Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath, WORLDCOMP-2011 held at Las Vegas,USA 18-21 Jul 2011
  8. Cryptography and Network, William Stallings, Prectice Hall of India.
  9. Modified Version of Playfair Cipher using Linear Feedback Shift Register, P. Murali and Gandhidoss Senthilkumar, UCSNS International journal of Computer Science and Network Security, Vol-8 No. 12, Dec 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Msa Algorithm Njjsaa Ttjsa Djmna Vernam Cipher Method