CFP last date
20 January 2025
Reseach Article

An Impregnable Block Cipher Generation using Modern Transposition and Substitution Algorithms with a large Key, Modular Arithmetic and Integral Functions

by S.udaya Kumar, Ravindra Babu Kallam, A.vinaya Babu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 46 - Number 4
Year of Publication: 2012
Authors: S.udaya Kumar, Ravindra Babu Kallam, A.vinaya Babu
10.5120/6898-9250

S.udaya Kumar, Ravindra Babu Kallam, A.vinaya Babu . An Impregnable Block Cipher Generation using Modern Transposition and Substitution Algorithms with a large Key, Modular Arithmetic and Integral Functions. International Journal of Computer Applications. 46, 4 ( May 2012), 36-43. DOI=10.5120/6898-9250

@article{ 10.5120/6898-9250,
author = { S.udaya Kumar, Ravindra Babu Kallam, A.vinaya Babu },
title = { An Impregnable Block Cipher Generation using Modern Transposition and Substitution Algorithms with a large Key, Modular Arithmetic and Integral Functions },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 46 },
number = { 4 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 36-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume46/number4/6898-9250/ },
doi = { 10.5120/6898-9250 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:38:54.338126+05:30
%A S.udaya Kumar
%A Ravindra Babu Kallam
%A A.vinaya Babu
%T An Impregnable Block Cipher Generation using Modern Transposition and Substitution Algorithms with a large Key, Modular Arithmetic and Integral Functions
%J International Journal of Computer Applications
%@ 0975-8887
%V 46
%N 4
%P 36-43
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this research, we have invented a method to generate the secure block cipher using modern transposition and substitution with 128bit key, modular and integral functions. This method supports an input in the form of ASCII, extended ASCII characters, images and diagrams etc. Initially, the algorithm converts the given input in to ANSI characters using rich text format, then it performs 16rounds of permutations with internal functions and finally it carryout color substitution. The functions used in this algorithm alter the plain text in various ways before it takes the shape of cipher text. A brief introduction about the tree data structures and its traversal methods has explained. The process of encryption, decryption and the sub key generation algorithms are explained with example. The avalanche effect and the cryptanalysis inspected in this investigation evidently indicate that the cipher is potential one.

References
  1. Denning, D. , F. Ayoub , " Cryptographic techniques and network security", IEEE proceedings, Vol 131, 684-694,Dec 1984.
  2. Stalling, " Cryptography and network security", Fourth edition, LPE, 81-7758-774-9.
  3. Ravindra babu, Udayakumar and Vinaya babu " A Survey on Cryptography and Steganography Methods for Infromation Security", IJCA, 0975-8887, Vol 12, No-2, Nov2010.
  4. Ravindra, Udaya and Vinaya babu, An Improved Playfair Cipher Cryptographic Substitution Algorithm, JARCS, (0976-5697), Volume 2, No-1, Jan-Feb 2011.
  5. Ravindra, Udaya and Vinaya babu, An Extension to traditional Playfair Cipher Cryptographic Substitution Method, IJCA, (0975 – 8887), Volume 17, No-5, March 2011.
  6. Ravindra Babu, Udaya Kumar and Vinaya babu, An Enhanced Poly alphabetic Cipher using Extended Vigenere Table, IJARCS, (0976-5697),Volume 2, No. 2, Mar-April 2011.
  7. Ravindra Babu, Udaya Kumar and Vinaya babu, An Enhanced and Efficient Cryptographic Substitution Method for Information Security, IJMA, Archive-2 (10), 2078-2083, Oct 2011.
  8. Ravindra, Udaya Kumar and Vinaya babu, A Contemporary Poly alphabetic Cipher using Comprehensive Vigenere Table, WCSIT,(2221-0741), Vol. 1,No 4, 167-171,2011
  9. Alaa, Bilal, A fast approach for braking RSA cryptosystem, WCSIT,2221-0741,Vol 1,No 6, 260-263, 2011.
  10. Ravindra Babu, Udaya Kumar and Vinaya babu, An Enhanced RSA public key cryptographic algorithm, communicated to IJARCS, 0976-5697, Vol-2, No 5, 497-499, Sep-Oct 2011.
  11. Ravindra, Udaya and Vinaya babu, A Paper on "a block cipher generation using Color Substitution" is published in International Journal of Computer Applications, (0975 – 8887), Volume 1- No-28, US, @2010.
  12. Ravindra Babu, Udaya Kumar and Vinaya babu, A New Frame Work for Scalable Secure Block Cipher Generation Using Color Substitution and Permutation on Characters, Numbers, Images and Diagrams, IJCA, Volume 20-no. 5, April 2011.
  13. Ravindra Babu, Udaya Kumar and Vinaya babu, A More secure block cipher generation involving multiple transposition and substitution with a large key, IJARCS, (0976-5697), Vol 2, No 2, Mar-April 2011.
  14. Ravindra Babu, Udaya Kumar and Vinaya babu, A Modern Play color cipher involving dynamic permutated key with iterative and modular arithmetic functions, IJARCS, (0976-5697), Vol 2, No 3, May-June 2011.
  15. Ravindra Babu, Udaya Kumar and Vinaya babu, A Variable length block cipher generation using modern play color cipher algorithm with alphanumeric key and iterative functions, published in the proceedings of ICNICT-11, ISBN 978-93-81126-21-1, No 56, 288-293.
  16. Ravindra Babu, Udaya Kumar and Vinaya babu, An Unassailable Block Cipher generation with an extended play color cipher, concerning a large alphanumeric key, modular arithmetic and integral functions, (0975-8887),IJCA, Volume 28-no. 9, August 2011.
  17. Ravindra Babu, Udaya Kumar and Vinaya Babu, A Block Cipher Generation Using an Innovative Permutation Algorithm, Communicated to International Journal of Mathematical Archive, ISSN-2229-5046.
  18. Yedidyah, Moshe J. Augenstein, M. Tenebaum, Data Structures Using C and C++, 2nd Edition, 249-319, ISBN-81-203-1177-9, Jan 2000.
  19. Ashok N. Kamthane, C and Data Structures, Pearson Education, ISBN 81-297-0261-4, pages:572-576, First edition, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Symmetric Block Cipher Play Color Cipher (pcc) Substitution Permutation Rsa Algorithm Rich Text Format (rtf) Pub: Public Key Of User B Pra: Private Key Of User A Pua: Public Key Of User A Prb: Private Key Of User B