A Novel Symmetric Key Cryptographic Technique at Bit Level Based on Spiral Matrix Concept

نویسندگان

  • Manas Paul
  • J. K. Mandal
چکیده

In this paper, we propose a session based bit level symmetric key cryptographic technique and it is termed as Spiral Matrix Based Bit Orientation Technique (SMBBOT). SMBBOT consider the input plain text as binary bit stream. During encryption this stream is chopped into manageable sized blocks with variable lengths. Bits of these blocks are taken from MSB to LSB to fit into a square matrix of suitable order following the concept of Spiral matrix. This square matrix splits into 2x2 sub-matrices. Bits are taken column-wise from all 2x2 sub-matrices to form the encrypted binary string. Cipher text is generated from this encrypted binary string. Combination of values of block length and no. of blocks of a session generates the session key for SMBBOT. For decryption the cipher text is considered as binary bit string. Processing the session key information, this binary string is broken down into predefined blocks. Bits of these blocks are taken from MSB to LSB to fit column-wise into 2x2 square matrices. Using these sub-matrices a single square matrix with suitable order is formed. The decrypted binary string is formed after taking the bits from the square matrix following the reverse concept of Spiral Matrix. The plain text is regenerated from decrypted binary string. A comparison of SMBBOT with existing and industrially accepted TDES and AES has been done.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proposing A Ciphering Protocol

This paper describes a novel bit level stream cipher based symmetric key cryptographic technique. At first, sender and receiver agree upon a symmetric key. Then the symmetric key is formed using Greatest Common Divisor (G.C.D) of sum of even or odd bit positional weight even or odd number and a symmetric key value is derived from the symmetric by the sender. The symmetric key value is XORed wit...

متن کامل

Proposing A Symmetric Key Bit-Level Block Cipher

A novel bit level block cipher based symmetric key cryptographic technique using G.C.D is proposed in this research paper. Entire plain text file is read one character at a time and according to the binary representation of ASCII value of the characters, entire plain text file is divided into n number of 16 bit blocks. Then an agreed-upon symmetric key file is formed by dividing each 16 bit blo...

متن کامل

Enhanced Security System Using Symmetric Encryption and Visual Cryptography

With the rapid development of internet, transfer of data reliably and securely has become one of the challenges. In this paper we have introduced a novel visual cryptographic technique. This method is applicable for both Bitmap Color and Grayscale images. This method uses the concept of Residual Number System (RNS) based on Chinese Remainder Theorem (CRT) for share creation and share stacking o...

متن کامل

A Stream Cipher based Bit-Level Symmetric Key Cryptographic Technique using Chen Prime Number

In this paper, a stream cipher based symmetric key cryptographic technique based on Chen prime number has been proposed. The proposed technique is suitable for encryption and decryption of a large number of files of almost any type. A symmetric key is formed by the sender directly from the plain text using Chen prime number. Then a symmetric key value is derived from the symmetric key which is ...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1305.0807  شماره 

صفحات  -

تاریخ انتشار 2013