Lightweight symmetric key encryption for text using XOR operation and permutation matrix

被引:4
作者
Deshmukh M. [1 ]
Rawat A.S. [1 ]
机构
[1] Department of Computer Science and Engineering, National Institute of Technology, Uttarakhand, Srinagar
关键词
ASCII; Cipher text; Decryption; Encryption; Permutation matrix; Plain text; Symmetric encryption; Variable-sized key; XOR matrix;
D O I
10.1007/s41870-023-01407-3
中图分类号
学科分类号
摘要
Traditionally, symmetric key encryption has been computationally intensive, and the balance between security and computation costs has necessitated the use of systems with simpler computations and variable-sized keys. This paper introduces a lightweight technique for symmetric key encryption of text, which utilizes less complex operations such as XOR and permutation matrices. The proposed method encrypts and decrypts text based on the ASCII values of plain text characters, using two symmetric keys to provide security. The use of lightweight and computationally efficient operations like XOR and permutation matrices ensures efficient encryption. One of the advantages of this approach is that it allows for the use of any key size without increasing computational complexity, while also enhancing security. Our statistical findings demonstrate that while increasing input size increases computation complexity, increasing key size does not affect it. Thus, any key size can be used for greater security. In summary, our proposed technique provides a simple, lightweight, and efficient method for data encryption and decryption with enhanced security using variable-sized keys. © 2023, The Author(s), under exclusive licence to Bharati Vidyapeeth's Institute of Computer Applications and Management.
引用
收藏
页码:3555 / 3562
页数:7
相关论文
共 27 条
[1]  
Bokhari M.U., Shallal Q.M., A review on symmetric key encryption techniques in cryptography, Int J Comput Appl, 147, 10, pp. 43-48, (2016)
[2]  
Abdullah A.M., Advanced encryption standard (AES) algorithm to encrypt and decrypt data, Cryptogr Netw Secur, 16, pp. 1-11, (2017)
[3]  
Han S.-J., Oh H.-S., Park J., The improved data encryption standard (DES) algorithm, Proceedings of ISSSTA’95 International Symposium on Spread Spectrum Techniques and Applications, 3, pp. 1310-1314, (1996)
[4]  
Knudsen L.R., Et al., On the design and security of RC2, International Workshop on Fast Software Encryption, (1998)
[5]  
Noura M., Et al., S-DES: An efficient and secure DES variant, IEEE Middle East and North Africa Communications Conference (MENACOMM), pp. 1-6, (2018)
[6]  
Milanov E., The RSA Algorithm, pp. 1-11, (2009)
[7]  
Imam R., Anwer F., Nadeem M., An effective and enhanced RSA based public key encryption scheme (XRSA), Int J Inf Technol, 14, 5, pp. 2645-2656, (2022)
[8]  
Merkle R.C., A certified digital signature, Conference on the Theory and Application of Cryptology, (1990)
[9]  
Yassein M.B., Et al., Comprehensive study of symmetric key and asymmetric key encryption algorithms, International Conference on Engineering and Technology (ICET), pp. 1-7, (2017)
[10]  
Hellman M.E., An overview of public key cryptography, IEEE Commun Mag, 40, 5, pp. 42-49, (2002)