Novel Block Cipher Involving a Key bunch Matrix and a Key-based Permutation and Substitution

被引:0
作者
Sastry, V. U. K. [1 ,2 ]
Shirisha, K. [3 ]
机构
[1] SNIST, CSE Dept, Hyderabad, Andhra Pradesh, India
[2] SNIST, R&D, Hyderabad, Andhra Pradesh, India
[3] SNIST, Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
关键词
Key bunch matrix; encryption; decryption; permutation; substitution; avalanche effect; cryptanalysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we have developed a novel block cipher involving a key bunch matrix supported by a key-based permutation and a key-based substitution. In this analysis, the decryption key bunch matrix is obtained by using the given encryption key bunch matrix and the concept of multiplicative inverse. From the cryptanalysis carried out in this investigation, we have seen that the strength of the cipher is remarkably good and it cannot be broken by any conventional attack.
引用
收藏
页码:116 / 122
页数:7
相关论文
共 50 条
  • [21] Key Based S-Box Selection and Key Expansion Algorithm for Substitution-Permutation Network Cryptography
    Nayaka, Raja Jitendra
    Biradar, R. C.
    2013 ANNUAL INTERNATIONAL CONFERENCE ON EMERGING RESEARCH AREAS & 2013 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMMUNICATIONS & RENEWABLE ENERGY (AICERA/ICMICR), 2013,
  • [22] Secure Key-Based Substitution-Boxes Design Using Systematic Search for High Nonlinearity
    Zahid, Amjad Hussain
    Elahi, Hafiz Ali Mansoor
    Ahmad, Musheer
    Maghrabi, Louai A.
    Said, Ramy Said Agieb
    IEEE ACCESS, 2023, 11 : 139745 - 139758
  • [23] Primitivity of the group of a cipher involving the action of the key-schedule
    Calderini, Marco
    JOURNAL OF ALGEBRA AND ITS APPLICATIONS, 2021, 20 (05)
  • [24] Securing Biometric Template using Double Hill Cipher with Self-Invertible Key and Random Permutation of Pixels Locations
    Lakhera, Manmohan
    Rauthan, M. M. S.
    Agarwal, Amit
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 814 - 817
  • [25] Symmetric-key block cipher for image and text cryptography
    Amador, JJ
    Green, RW
    INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2005, 15 (03) : 178 - 188
  • [26] PERMUTATION INDUCED SHUFFLING BASED BLOCK CIPHER FOR REAL-TIME APPLICATIONS
    Radha, N.
    Venkatesulu, M.
    MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2014, 27 (01) : 20 - 34
  • [27] Related-Key Boomerang Attack on Block Cipher SQUARE
    Koo, Bonwook
    Yeom, Yongjin
    Song, Junghwan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 3 - 9
  • [28] A Single-Key Attack on the Full GOST Block Cipher
    Isobe, Takanori
    JOURNAL OF CRYPTOLOGY, 2013, 26 (01) : 172 - 189
  • [29] Permutation of Image Encryption System Based block cipher and stream cipher encryptioin Algorithm
    Huang Chunguang
    Cheng Hai
    Song Yu
    Ding Qun
    2015 THIRD INTERNATIONAL CONFERENCE ON ROBOT, VISION AND SIGNAL PROCESSING (RVSP), 2015, : 163 - 166
  • [30] A Single-Key Attack on the Full GOST Block Cipher
    Isobe, Takanori
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 290 - 305