Novel Block Cipher Involving a Key bunch Matrix and a Key-based Permutation and Substitution

被引:0
|
作者
Sastry, V. U. K. [1 ,2 ]
Shirisha, K. [3 ]
机构
[1] SNIST, CSE Dept, Hyderabad, Andhra Pradesh, India
[2] SNIST, R&D, Hyderabad, Andhra Pradesh, India
[3] SNIST, Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
关键词
Key bunch matrix; encryption; decryption; permutation; substitution; avalanche effect; cryptanalysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we have developed a novel block cipher involving a key bunch matrix supported by a key-based permutation and a key-based substitution. In this analysis, the decryption key bunch matrix is obtained by using the given encryption key bunch matrix and the concept of multiplicative inverse. From the cryptanalysis carried out in this investigation, we have seen that the strength of the cipher is remarkably good and it cannot be broken by any conventional attack.
引用
收藏
页码:116 / 122
页数:7
相关论文
共 50 条
  • [31] Novel Hash Based Key Generation for Stream Cipher in Cloud
    DeviPriya, K.
    Sumalatha, L.
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 283 - 290
  • [32] Generation of Key Matrix for Hill Cipher Encryption Using Classical Cipher
    Mani, K.
    Mahendran, R.
    2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT), 2017, : 51 - 54
  • [33] A Modified Feistel Cipher Involving Modular Arithmetic Addition and Modular Arithmetic Inverse of a Key Matrix
    Sastry, V. U. K.
    Kumar, K. Anup
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (07) : 40 - 43
  • [34] A Modified Feistel Cipher Involving Substitution, shifting of rows, mixing of columns, XOR operation with a Key and Shuffling
    Sastry, V. U. K.
    Kumar, K. Anup
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (08) : 23 - 29
  • [35] Secret key-based Authentication with a Privacy Constraint
    Kittichokechai, Kittipong
    Caire, Giuseppe
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1791 - 1795
  • [36] USB Key-Based Approach for Software Protection
    Li MeiHong
    Liu JiQiang
    2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL MECHATRONICS AND AUTOMATION, 2009, : 151 - 153
  • [37] Ephemeral Key-based Hybrid Hardware Obfuscation
    Nasir, Neelam
    Ali Malik, Arsalan
    Tahir, Ifra
    Masood, Ammar
    Riaz, Naveed
    Proceedings of 2022 19th International Bhurban Conference on Applied Sciences and Technology, IBCAST 2022, 2022, : 646 - 652
  • [38] A Novel Feistel Cipher Involving a Bunch of Keys Supplemented with XOR Operation
    Sastry, V. U. K.
    Kumar, K. Anup
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (12) : 92 - 96
  • [39] Key Based S-Box Selection and Key Expansion Algorithm for Substitution-Permutation Network Cryptography
    Nayaka, Raja Jitendra
    Biradar, R. C.
    2013 ANNUAL INTERNATIONAL CONFERENCE ON EMERGING RESEARCH AREAS & 2013 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMMUNICATIONS & RENEWABLE ENERGY (AICERA/ICMICR), 2013,
  • [40] keybin Key-based Binning for Distributed Clustering
    Chen, Xinyu
    Benson, Jeremy
    Estrada, Trilce
    2017 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2017, : 572 - 581