CFP last date
20 December 2024
Reseach Article

Format Preserving Encryption using Feistel Cipher

Published on February 2013 by S. Vidhya, K. Chitra
International Conference on Research Trends in Computer Technologies 2013
Foundation of Computer Science USA
ICRTCT - Number 1
February 2013
Authors: S. Vidhya, K. Chitra
81f2b7b4-30c5-4092-b4ab-d83323b84110

S. Vidhya, K. Chitra . Format Preserving Encryption using Feistel Cipher. International Conference on Research Trends in Computer Technologies 2013. ICRTCT, 1 (February 2013), 5-8.

@article{
author = { S. Vidhya, K. Chitra },
title = { Format Preserving Encryption using Feistel Cipher },
journal = { International Conference on Research Trends in Computer Technologies 2013 },
issue_date = { February 2013 },
volume = { ICRTCT },
number = { 1 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 5-8 },
numpages = 4,
url = { /proceedings/icrtct/number1/10800-1002/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Research Trends in Computer Technologies 2013
%A S. Vidhya
%A K. Chitra
%T Format Preserving Encryption using Feistel Cipher
%J International Conference on Research Trends in Computer Technologies 2013
%@ 0975-8887
%V ICRTCT
%N 1
%P 5-8
%D 2013
%I International Journal of Computer Applications
Abstract

This paper presents a Format preserving encryption algorithm using Feistel Cipher. Cryptography is a useful technique to transmit large amount of data in a secured way through an internet. In Cryptography, Encryption is used to convert the original information (Plain text) to unreadable intelligent form (Cipher text). Format Preserving Encryption is used to maintain the length and format of the cipher text as plaintext after encryption.

References
  1. M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers. Format-preserving encryption. SAC 2009. LNCS 5867,Springer, 2009.
  2. V. Hoang and P. Rogaway. On generalized Feistel networks. Conference version of this paper. CRYPTO 2010,Springer, 2010.
  3. J. Patarin. Security of random Feistel schemes with 5 or more rounds. CRYPTO 2004, LNCS 3152, Springer,pp. 106–122, 2004.
  4. Format Preserving Encryption Terence SpiesVoltage Security, Inc.
  5. M. Bellare, P. Rogaway, and T. Spies. The FFXmode of operation for format-preserving encryption(Draft 1. 1). February, 2010. Manuscript (standards proposal) submitted to NIST.
  6. BPS: A Format-Preserving Encryption Proposal Eric Brier, Thomas Peyrin and Jacques SternIngenico, France
Index Terms

Computer Science
Information Sciences

Keywords

Fpe Format Preserving Encryption Data Type Preserving Encryption Block Cipher