CFP last date
20 December 2024
Reseach Article

A Block Cipher Involving a Key Bunch Matrix and Including another Key Matrix Supplemented With Xor Operation

by V. U. K. Sastry, K. Shirisha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 55 - Number 16
Year of Publication: 2012
Authors: V. U. K. Sastry, K. Shirisha
10.5120/8837-3062

V. U. K. Sastry, K. Shirisha . A Block Cipher Involving a Key Bunch Matrix and Including another Key Matrix Supplemented With Xor Operation. International Journal of Computer Applications. 55, 16 ( October 2012), 7-10. DOI=10.5120/8837-3062

@article{ 10.5120/8837-3062,
author = { V. U. K. Sastry, K. Shirisha },
title = { A Block Cipher Involving a Key Bunch Matrix and Including another Key Matrix Supplemented With Xor Operation },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 55 },
number = { 16 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 7-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume55/number16/8837-3062/ },
doi = { 10.5120/8837-3062 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:57:24.248929+05:30
%A V. U. K. Sastry
%A K. Shirisha
%T A Block Cipher Involving a Key Bunch Matrix and Including another Key Matrix Supplemented With Xor Operation
%J International Journal of Computer Applications
%@ 0975-8887
%V 55
%N 16
%P 7-10
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we have developed a block cipher which includes a pair of key matrices. The first key matrix E is a key bunch matrix which is containing several odd integers as keys lying in [1-255], and the second key matrix F is an additional matrix, linked with xor operation, containing the integers in [0-255]. The corresponding key bunch D, used in the decryption process, is obtained by using the concept of multiplicative inverse. From the cryptanalysis carried out in this investigation we have found that this cipher is a very strong one and it cannot be broken by any attack.

References
  1. Lester Hill, (1929), "Cryptography in an algebraic alphabet", (V. 36 (6), pp. 306-312. ), American Mathematical Monthly.
  2. Arthur C. Clarke's Venus Prime, volume 2: Maelstrom. New York. Avon Books, 1988.
  3. Fiestal H. , Cryptography and Computer Privacy, Scientific American, May 1973.
  4. National Bureau of Standards NBS FIPS PUB 46 "Data Encryption Standard (DES)", US Department of Commerce, January 1977.
  5. Daemen J. , Rijman V. , "Rijndael, The Advanced Encryption Standard (AES)", Dr. Dobb's Journal, vol. 26, No. 3, March 2001, pp. 137-139
  6. V. U. K. Sastry , K. Shirisha, "A Novel Block Cipher Involving a Key Bunch Matrix" sent for publication.
  7. William Stallings: Cryptography and Network Security: Principle and Practices", Third Edition 2003, Chapter 2, pp. 29.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption key bunch matrix Decryption key bunch matrix avalanche effect cryptanalysis