International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 70 - Number 18 |
Year of Publication: 2013 |
Authors: Gautam Rakshit, Suman Deb, Ashim Saha |
10.5120/12171-8337 |
Gautam Rakshit, Suman Deb, Ashim Saha . A Two Round Block Cipher Symmetric Key Cryptography based on Key Stream. International Journal of Computer Applications. 70, 18 ( May 2013), 42-47. DOI=10.5120/12171-8337
Data security is one of the challenges of all times. In the modern computer parlance it is important to secure the vital data. One of the common aspects of data security is the privacy for which Cryptography is the promising methodology. Cryptographic computations can be used in different concerned areas of computer communication for encrypting and transmitting the information. cryptography has shown its effectiveness in the field of secured data transmission and much research work is going on to make the computational process more complex to the unauthorized users so that they cannot decrypt the information in a reasonable time. In this research work, strong substitution based encryption algorithms are proposed and the encryption and decryption process are broadly divided into two rounds and key stream generating procedures are proposed. The proposed procedures are being implemented, analyzed and it shows its efficiency in computation, storage and transmission; and it is more powerful during the decryption process. Proper care has been taken so as to keep the cipher text output file size as close to the plain text file size for fast transmission and besides these the decryption time is more than the encryption time. This paper includes the procedures like Substituent list generation, key generation, encryption and decryption that are continued and enhanced from the previous proposed work [10]. The performances are finally demonstrated and its implementations (using C # language) are explained and analyzed.