CFP last date
20 December 2024
Reseach Article

A Generalized Key Scheme in a Block Cipher Algorithm and its Cryptanalysis

by Soosaimicheal Aruljothi, Mandadi Venkatesulu and
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 9
Year of Publication: 2012
Authors: Soosaimicheal Aruljothi, Mandadi Venkatesulu and
10.5120/7652-0747

Soosaimicheal Aruljothi, Mandadi Venkatesulu and . A Generalized Key Scheme in a Block Cipher Algorithm and its Cryptanalysis. International Journal of Computer Applications. 49, 9 ( July 2012), 1-6. DOI=10.5120/7652-0747

@article{ 10.5120/7652-0747,
author = { Soosaimicheal Aruljothi, Mandadi Venkatesulu and },
title = { A Generalized Key Scheme in a Block Cipher Algorithm and its Cryptanalysis },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 9 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number9/7652-0747/ },
doi = { 10.5120/7652-0747 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:46:19.554232+05:30
%A Soosaimicheal Aruljothi
%A Mandadi Venkatesulu and
%T A Generalized Key Scheme in a Block Cipher Algorithm and its Cryptanalysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 9
%P 1-6
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The prominent block cipher algorithms use two key schemes that characterize different use of keys in the encryption/decryption process. In the family of DES algorithms the keys are used as position pointers for input matrix; in the family of AES algorithm the keys are used as co operand with input matrix. The proposed crypt algorithm combines the idea of keys as position pointers and input matrix as co operand in the encryption/decryption process. The novel use of keys characterizes the nature of the proposed algorithm. This new algorithm found to outperform the existing cryptographic strategies in the common cryptanalysis criteria. This paper discusses and presents a crypt analysis of a new block cipher algorithm based on generalized key scheme.

References
  1. Mitra A et al. , "A new image encryption approach using combinational permutation techniques. International Journal of Computer Science", vol. 1, no. 2 , pp. 1306-4428, 2006.
  2. Stallings W, "Cryptography and network security", 4th Ed. , prentice hall, PP. 58-309, 2005.
  3. Coppersmith D, "The data encryption standard(DES) and its strength against attacks", IBM Journal of Research and development, pp. 243-250, may 1994.
  4. Ferguson N et al. , "Practical Cryptography", John Wiley and sons, 2003.
  5. Ismail et al. , "A digital image encryption algorithm based a composition of two chaotic logistic map", International Journal of Network Security, vol. 11, no. 1 , pp. 1-10, 2010.
  6. Nayak et al. , "Image encryption using an enhanced block based transformation algorithm", International Journal of Research and Review in Computer Science, vol. 2, no. 2 , pp. 275-279, 2011.
  7. Wang X Y et al. , "A chaotic image encryption algorithm based on perceptron model", Nonlinear Dynamics, vol. 62, no. 3, pp. 615–621, 2010.
  8. Sathishkumar G. A et al. , "A novel image encryption algorithm using pixel shuffling Base 64 encoding based chaotic block cipher", WSEAS Transactions on computers, vol. 10, no. 6, pp. 169–178, 2011.
  9. Chen et al. , "A novel image encryption algorithm based on logistic maps", Advances in Information Science and Service Sciences, vol. 3, no. 7, pp. 364–372, 2011.
  10. Xiang T et al. , "A Novel Block Cryptosystem Based on Iterating a Chaotic Map," Phys. Lett. A, vol. 349, pp. 109-115, 2006.
  11. Lian S. G et al. , "A Block Cipher Based on a Suitable Use of Chaotic Standard Map," Chaos, Solitons and Fractals, vol. 26, no. 1, pp. 117-129, 2005.
  12. Wong K. W et al. , "A Fast Image Encryption Scheme Based on Chaotic Standard Map," Phys. Lett. A, vol. 372, no. 15, pp. 2645-2652, 2008.
  13. Y. B. Mao, G. Chen, and S. G. Lian, "A novel fast image encryption scheme based on the 3D chaotic baker map", Int. J. Bifurcation Chaos Appl. Sci. Eng. PP. 3613–3624 , 2004.
  14. Shatheesh Sam I et al. , "Block Cipher Scheme for Image Cryptosystem Using Alternative Chaotic Maps ", European Journal of Scientific Research. PP. 232- – 240, vol. 51, No. 2, 2011.
  15. FIPS 140-2, "Security requirements for cryptographic modules", Federal Information Processing Standards publication. May 2001.
  16. E. Biham and A. Shamir, "Differential Cryptanalysis of the Full 16-Round DES," in Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology: Springer-Verlag, 1993.
Index Terms

Computer Science
Information Sciences

Keywords

Block cipher Cryptanalysis Key Schemes AES DES