Data Encryption by Excluding Repetitive Character in Cipher Text
نویسندگان
چکیده
AbstractIn modern world, cryptography hackers try to break a cryptographic algorithm or try to retrieve the key, which is needed to encrypt a message (data), by analyzing the insertion or presence of repetitive bits / characters (bytes) in the message and encrypted message to find out the encryption algorithm or the key used for it. So it is must for a good encryption method to exclude the repetitive terms such that no trace of repetitions can be tracked down., Somdip Dey, Joyshree Nath and Ashoke Nath (SJA) is an amalgamation of Modified Caesar cipher(MCC), Bit Rotation Reversal(BRR), Neeraj Khanna, Joel James, Joyshree Nath, Sayantyan Chakraborty, Amlan Chakrabarti, Asoke nath (NJJSAA), Function Encryption (FE) methods.By using MCC, BRR, NJJSAA and FE methods we can reduce time complexity by exluding repetitive characters in the cipher text. The proposed method is robust in terms of efficiency and computational costs
منابع مشابه
Cipher text only attack on speech time scrambling systems using correction of audio spectrogram
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
متن کاملImproving Security of Vigenère Cipher by Double Columnar Transposition
Protecting data from malicious attacks during storage and transmission is the reason for using encryption. Encryption can be achieved by two methods – Transposition and Substitution. Transposition refers to changing the order of characters in a given text. On the other hand, substitution is the process of replacing each character of the plaintext with some other character. Using a combination o...
متن کاملProposing A Ciphering Protocol
This paper describes a novel bit level stream cipher based symmetric key cryptographic technique. At first, sender and receiver agree upon a symmetric key. Then the symmetric key is formed using Greatest Common Divisor (G.C.D) of sum of even or odd bit positional weight even or odd number and a symmetric key value is derived from the symmetric by the sender. The symmetric key value is XORed wit...
متن کاملDesign of Stream Cipher for Text Encryption using Particle Swarm Optimization based Key Generation
Encryption of data traffic in a network is essential since it is vulnerable to eavesdropping. Thus the data transferred in a network is encrypted. Encryption can be done using stream cipher method such as Vernam Cipher which is considered to be the perfect cipher. However this method suffers from the drawback of storing and distributing a large number of keys. In this paper we propose a Particl...
متن کاملFormat Controlling Encryption Using Datatype Preserving Encryption
DatatypePreserving Encryption (DTP) enables encryption of values within a certain character set into ciphertext restricted to the same set, while still keeping data length. This is in contrast to conventional block cipher modes which produce binary data, i e each encrypted character may have an arbitrary value, possibly outside the original character set, often accompanied with a length expans...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013