CFP last date
20 January 2025
Reseach Article

Implementation and Analysis of a Novel Block Cipher

by M. Kiran Reddy, K. J. Jegadish Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 8
Year of Publication: 2014
Authors: M. Kiran Reddy, K. J. Jegadish Kumar
10.5120/15525-4340

M. Kiran Reddy, K. J. Jegadish Kumar . Implementation and Analysis of a Novel Block Cipher. International Journal of Computer Applications. 89, 8 ( March 2014), 34-36. DOI=10.5120/15525-4340

@article{ 10.5120/15525-4340,
author = { M. Kiran Reddy, K. J. Jegadish Kumar },
title = { Implementation and Analysis of a Novel Block Cipher },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 8 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 34-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number8/15525-4340/ },
doi = { 10.5120/15525-4340 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:08:44.451215+05:30
%A M. Kiran Reddy
%A K. J. Jegadish Kumar
%T Implementation and Analysis of a Novel Block Cipher
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 8
%P 34-36
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a new cryptographic technique for secured transmission of text and image data over communication networks. The new algorithm named Fixed Block with Dynamic key (FBDK) is designed using simple operations like XOR, circular shifts, substitutions. It uses input fixed blocks of any size based on the size of the original message bits and key size is dynamic for each block which makes it more resistant to cryptanalysis. The performance analysis of FBDK algorithm for digital images, text data is performed. Experimental tests are carried out in detail to show high quality, efficiency of FBDK algorithm.

References
  1. Ashwak Al-Abiachi, M. , Faudziah Ahmad, and Ku Ruhana. 2011. A Competitive Study of Cryptography Techniques over block cipher .
  2. Amitesh Singh Rajput, Nishchol Mishra, and Sanjeev Sharma. 2013. Towards the Growth of Image Encryption and Authentication Schemes.
  3. Chen, C. Y. , Chang, C. C. , and Yang, W. P. 1996. Hybrid method to modular exponentiation with precomputations.
  4. Morris Mano, M. , and Michael ciletti, D. 2008. Digital Design. Fourth edition.
  5. Koblitz, N. 1994. A Course in Number Theory and Cryptography. Second Edition.
  6. Nitty Sarah Alex, Jani Anbarasi, L. 1985. Enhanced Image Secret Sharing via Error Diffusion in Halftone Visual Cryptography.
  7. Chen, G. , Mao, Y. , and Chui, C. K. 2004. A symmetric image encryption scheme based on 3D chaotic cat maps.
  8. Arul jothi, S. , and Venkatesulu, M. 2012. Encryption Quality and Performance Analysis of GKSBC algorithm.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Ciphers Encryption Public Key Random number generation