CFP last date
20 December 2024
Reseach Article

SPKP (Split Plaintext Key Pair) Algorithm � A Novel Method for Symmetric Encryption

Published on July 2012 by Renjith Pr, Anita John, Praseeda K Gopinadhan
Advanced Computing and Communication Technologies for HPC Applications
Foundation of Computer Science USA
ACCTHPCA - Number 1
July 2012
Authors: Renjith Pr, Anita John, Praseeda K Gopinadhan
95b28222-35a2-449d-a60b-7dcbe3f2a3e3

Renjith Pr, Anita John, Praseeda K Gopinadhan . SPKP (Split Plaintext Key Pair) Algorithm � A Novel Method for Symmetric Encryption. Advanced Computing and Communication Technologies for HPC Applications. ACCTHPCA, 1 (July 2012), 1-6.

@article{
author = { Renjith Pr, Anita John, Praseeda K Gopinadhan },
title = { SPKP (Split Plaintext Key Pair) Algorithm � A Novel Method for Symmetric Encryption },
journal = { Advanced Computing and Communication Technologies for HPC Applications },
issue_date = { July 2012 },
volume = { ACCTHPCA },
number = { 1 },
month = { July },
year = { 2012 },
issn = 0975-8887,
pages = { 1-6 },
numpages = 6,
url = { /specialissues/accthpca/number1/7547-1001/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Advanced Computing and Communication Technologies for HPC Applications
%A Renjith Pr
%A Anita John
%A Praseeda K Gopinadhan
%T SPKP (Split Plaintext Key Pair) Algorithm � A Novel Method for Symmetric Encryption
%J Advanced Computing and Communication Technologies for HPC Applications
%@ 0975-8887
%V ACCTHPCA
%N 1
%P 1-6
%D 2012
%I International Journal of Computer Applications
Abstract

Cryptography, defined as the science and study of secret writing, concerns the ways in which communications and data can be encoded to prevent disclosure of their contents through eavesdropping or message interception, using codes, ciphers and other methods, so that only intended people can see the real message. The design and implementation of a new symmetric key algorithm SPKP (Split Plaintext Key Pair)[1] is proposed . The algorithm encrypts the plaintext file by using the password of the file as the key. The plaintext and key are split in equal numbers and shift cipher is applied to each block of the plaintext. This new algorithm can be considered as a hybrid approach to its precursors.

References
  1. Renjith PR, Arun Sojan, Praseeda K Gopindhan, "A Novel Method for Symmetric Encryption using Split Plaintext Key Pair (Pi,Ki) Algorithm", International Journal of Computer Applications, Special Issue on Network Security and Cryptography November 2011
  2. William Stallings, "Cryptography and Network Security" 4th Edition. Pearson Education Inc, Upper Saddle River, New Jersey, 2006.
  3. Kerckhoffs's principle or Kerckhoffs's Desiderata of Cryptography Online : http://en. wikipedia. org/wiki/Kerckhoffs's_principle accessed 11 June 2011
  4. Kenneth W. Dam, National Research Council (U. S. ). Committee to Study National Cryptography Policy "Cryptography's Role in Securing the Information Society" pp 202
  5. Christopher Paar, Jan Pelzl, Bart Preneel,"Understanding Cryptography- A Textbook for Students and Practitioners", Springer, Berlin Heidelberg 2010.
  6. Shift cipher Online: en. wikipedia. org/wiki/Caesar_cipher
  7. Frequency analysis Online: http://en. wikipedia. org/wiki/Frequency_analysis accessed 11 June 2011
  8. Diffie Hellman key exchange online: en. wikipedia. org/wiki/Diffie–Hellman_key_exchange accessed 11 June 2011
  9. Schneier. Applied Cryptography. Wiley and Sons, 1996.
  10. Ding Huang and Hong Yan, "Interword Distance Changes Represented by Sine Waves for Watermarking Text Images" Online: www. sydney. edu. au/engineering/it/~vip2000/papers/ accessed 8 June 2012
  11. Monika Agrawal and Pradeep Mishra, "A Comparative Survey on Symmetric Key Encryption Techniques", International Journal on Computer Science and Engineering May 2012
  12. V. U. K. Sastry,D. S. R. Murthy,S. Durga Bhavani,Block Cipher Having a Key on One Side of the Plain Text Matrix and its Inverse on the Other Side, International Journal of Computer Theory and Engineering, Vol. 2, No. 5, October, 2010
Index Terms

Computer Science
Information Sciences

Keywords

Symmetric Cryptosystem Information Security Split-plaintext-key Pair