Novel Block Cipher Involving a Key bunch Matrix and a Key-based Permutation and Substitution

被引:0
作者
Sastry, V. U. K. [1 ,2 ]
Shirisha, K. [3 ]
机构
[1] SNIST, CSE Dept, Hyderabad, Andhra Pradesh, India
[2] SNIST, R&D, Hyderabad, Andhra Pradesh, India
[3] SNIST, Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
关键词
Key bunch matrix; encryption; decryption; permutation; substitution; avalanche effect; cryptanalysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we have developed a novel block cipher involving a key bunch matrix supported by a key-based permutation and a key-based substitution. In this analysis, the decryption key bunch matrix is obtained by using the given encryption key bunch matrix and the concept of multiplicative inverse. From the cryptanalysis carried out in this investigation, we have seen that the strength of the cipher is remarkably good and it cannot be broken by any conventional attack.
引用
收藏
页码:116 / 122
页数:7
相关论文
共 50 条
[21]   Novel Hash Based Key Generation for Stream Cipher in Cloud [J].
DeviPriya, K. ;
Sumalatha, L. .
COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 :283-290
[22]   Key Based S-Box Selection and Key Expansion Algorithm for Substitution-Permutation Network Cryptography [J].
Nayaka, Raja Jitendra ;
Biradar, R. C. .
2013 ANNUAL INTERNATIONAL CONFERENCE ON EMERGING RESEARCH AREAS & 2013 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMMUNICATIONS & RENEWABLE ENERGY (AICERA/ICMICR), 2013,
[23]   Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity [J].
Zahid, Amjad Hussain ;
Elahi, Hafiz Ali Mansoor ;
Ahmad, Musheer ;
Maghrabi, Louai A. ;
Said, Ramy Said Agieb .
IEEE ACCESS, 2023, 11 :139745-139758
[24]   Primitivity of the group of a cipher involving the action of the key-schedule [J].
Calderini, Marco .
JOURNAL OF ALGEBRA AND ITS APPLICATIONS, 2021, 20 (05)
[25]   Securing Biometric Template using Double Hill Cipher with Self-Invertible Key and Random Permutation of Pixels Locations [J].
Lakhera, Manmohan ;
Rauthan, M. M. S. ;
Agarwal, Amit .
PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, :814-817
[26]   Symmetric-key block cipher for image and text cryptography [J].
Amador, JJ ;
Green, RW .
INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2005, 15 (03) :178-188
[27]   PERMUTATION INDUCED SHUFFLING BASED BLOCK CIPHER FOR REAL-TIME APPLICATIONS [J].
Radha, N. ;
Venkatesulu, M. .
MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2014, 27 (01) :20-34
[28]   Related-Key Boomerang Attack on Block Cipher SQUARE [J].
Koo, Bonwook ;
Yeom, Yongjin ;
Song, Junghwan .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) :3-9
[29]   Permutation of Image Encryption System Based block cipher and stream cipher encryptioin Algorithm [J].
Huang Chunguang ;
Cheng Hai ;
Song Yu ;
Ding Qun .
2015 THIRD INTERNATIONAL CONFERENCE ON ROBOT, VISION AND SIGNAL PROCESSING (RVSP), 2015, :163-166
[30]   A Single-Key Attack on the Full GOST Block Cipher [J].
Isobe, Takanori .
JOURNAL OF CRYPTOLOGY, 2013, 26 (01) :172-189