Novel Block Cipher Involving a Key bunch Matrix and a Key-based Permutation and Substitution

被引:0
作者
Sastry, V. U. K. [1 ,2 ]
Shirisha, K. [3 ]
机构
[1] SNIST, CSE Dept, Hyderabad, Andhra Pradesh, India
[2] SNIST, R&D, Hyderabad, Andhra Pradesh, India
[3] SNIST, Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
关键词
Key bunch matrix; encryption; decryption; permutation; substitution; avalanche effect; cryptanalysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we have developed a novel block cipher involving a key bunch matrix supported by a key-based permutation and a key-based substitution. In this analysis, the decryption key bunch matrix is obtained by using the given encryption key bunch matrix and the concept of multiplicative inverse. From the cryptanalysis carried out in this investigation, we have seen that the strength of the cipher is remarkably good and it cannot be broken by any conventional attack.
引用
收藏
页码:116 / 122
页数:7
相关论文
共 50 条
[31]   A Single-Key Attack on the Full GOST Block Cipher [J].
Isobe, Takanori .
FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 :290-305
[32]   Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher [J].
Ahmad, Musheer ;
Ahmad, Faiyaz .
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1, 2015, 327 :481-488
[33]   Key Schedule Algorithm using 3-Dimensional Hybrid Cubes for Block Cipher [J].
Mushtaq, Muhammad Faheem ;
Jame, Sapiee ;
Megat, Siti Radhiah B. ;
Akram, Urooj ;
Deris, Mustafa Mat .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (08) :427-442
[34]   On the Security of Key-Based Interval Splitting Arithmetic Coding With Respect to Message Indistinguishability [J].
Katti, Rajendra S. ;
Vosoughi, Aida .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :895-903
[35]   Hash key-based image cryptosystem using chaotic maps and cellular automata [J].
Ben Slimane, Nabil ;
Aouf, Nahed ;
Bouallegue, Kais ;
Machhout, Mohsen .
2018 15TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES (SSD), 2018, :190-194
[36]   SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage [J].
Dave, Jay ;
Faruki, Parvez ;
Laxmi, Vijay ;
Zemmari, Akka ;
Gaur, Manoj ;
Conti, Mauro .
COMPUTER COMMUNICATIONS, 2020, 154 (154) :148-159
[37]   Lightweight symmetric key encryption for text using XOR operation and permutation matrix [J].
Deshmukh M. ;
Rawat A.S. .
International Journal of Information Technology, 2023, 15 (7) :3555-3562
[38]   A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution [J].
Arif, Jameel ;
Khan, Muazzam A. ;
Ghaleb, Baraq ;
Ahmad, Jawad ;
Munir, Arslan ;
Rashid, Umer ;
Al-Dubai, Ahmed Y. .
IEEE ACCESS, 2022, 10 :12966-12982
[39]   VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography [J].
Khan, Muhammad Shahbaz ;
Ahmad, Jawad ;
Ali, Muhammad ;
Al Dubai, Ahmed ;
Pitropakis, Nikolaos ;
Buchanan, William J. .
2024 IEEE 7TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SIGNAL AND IMAGE PROCESSING, ATSIP 2024, 2024, :376-381
[40]   A simple power analysis attack against the key schedule of the Camellia block cipher [J].
Xiao, L ;
Heys, HM .
INFORMATION PROCESSING LETTERS, 2005, 95 (03) :409-412