Word-based encryption algorithm using dictionary indexing with variable encryption key length

نویسندگان

چکیده

<p>This paper proposes a new algorithm for text encryption utilizing English words as unit of encoding. The vanishes any feature that could be used to reveal the encrypted through adopting variable code lengths words, variable-length key, applying two-dimensional binary shuffling techniques at bit level, and four logical operations with randomized inputs. alphabetically sorted are divided into lookup tables where each word has assigned an index. strength proposed concluded from having two major components. Firstly, table utilizes different index sizes, all sizes not multiples bytes. Secondly, conducted on matrix length. Lastly, parameters operation based randomly selected key varying size. Thus, move adjacent bits away in fashion. Definitively, signature or statistical features original message. Moreover, reduces size message additive advantage which is achieved smallest possible table.</p>

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Message Based Random Variable Length Key Encryption Algorithm

Problem statement: A block ciphers provides confidentiality in cryptography but cryptanalysis of the classical block ciphers demonstrated some old weaknesses grabbing a partial key in any stage of encryption procedure leads to reconstructing the whole key. Exhaustive key search shows that key generation should be indeterminist and random for each round. Matching cipher-text attack shows that la...

متن کامل

A Key Dependent Encryption Algorithm Based on Multiple Bitwise-Shuffling and XOR Variable-Length Partitions

Email: [email protected] Abstract: This new algorithm employs shuffling procedures combined with variable-length key-dependent XOR and S-box substitutions to perform lossless image encryption. This algorithm was implemented and tested by performing different permutations of shuffling, XOR encryption and S-box substitution. Empirical analysis using different types of test images of different s...

متن کامل

Public–Key Encryption using Decoder Algorithm

With the ever increasing confidential data being sent on the fast spreading computer networks the security aspect has become the focal point. One of the methods that has been used for various applications is the public-key encryption technique, which has been used with fair success. However, sound public-key cryptosystems are yet to be developed and a lot of work is focused on to this aspect of...

متن کامل

Cryptanalysis of GSM encryption algorithm A5/1

The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 239.91and 221.1, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Power Electronics and Drive Systems

سال: 2022

ISSN: ['2722-2578', '2722-256X']

DOI: https://doi.org/10.11591/ijece.v12i1.pp669-683