Novel Block Cipher Involving a Key bunch Matrix and a Key-based Permutation and Substitution

被引:0
作者
Sastry, V. U. K. [1 ,2 ]
Shirisha, K. [3 ]
机构
[1] SNIST, CSE Dept, Hyderabad, Andhra Pradesh, India
[2] SNIST, R&D, Hyderabad, Andhra Pradesh, India
[3] SNIST, Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
关键词
Key bunch matrix; encryption; decryption; permutation; substitution; avalanche effect; cryptanalysis;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we have developed a novel block cipher involving a key bunch matrix supported by a key-based permutation and a key-based substitution. In this analysis, the decryption key bunch matrix is obtained by using the given encryption key bunch matrix and the concept of multiplicative inverse. From the cryptanalysis carried out in this investigation, we have seen that the strength of the cipher is remarkably good and it cannot be broken by any conventional attack.
引用
收藏
页码:116 / 122
页数:7
相关论文
共 50 条
[41]   A superlative image encryption technique based on bit plane using key-based electronic code book [J].
Kumari, Manju ;
Gupta, Shailender ;
Malik, Anjali .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (43-44) :33161-33191
[42]   Hash key-based image encryption using crossover operator and chaos [J].
Guesmi, Ramzi ;
Ben Farah, Mohamed Amine ;
Kachouri, Abdennaceur ;
Samet, Mounir .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) :4753-4769
[43]   A superlative image encryption technique based on bit plane using key-based electronic code book [J].
Manju Kumari ;
Shailender Gupta ;
Anjali Malik .
Multimedia Tools and Applications, 2020, 79 :33161-33191
[44]   A Novel Image Stream Cipher Based On Dynamic Substitution [J].
Elsharkawi, Abdelfattah ;
El-Sagheer, Ragab M. ;
Akah, Haitham ;
Taha, Hatem .
ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2016, 6 (05) :1195-1199
[45]   Key-Based Data Deduplication via Homomorphic NTRU for Internet of Vehicles [J].
Huang, Darong ;
Zhou, Jinfu ;
Mi, Bo ;
Kuang, Fengtian ;
Liu, Yang .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (01) :239-252
[46]   A Symmetric Key Multiple Color Image Cipher Based on Cellular Automata, Chaos Theory and Image Mixing [J].
SundaraKrishnan, K. ;
Jaison, B. ;
Raja, S. P. .
INFORMATION TECHNOLOGY AND CONTROL, 2021, 50 (01) :55-75
[47]   Weak key analysis for chaotic cipher based on randomness properties [J].
Yin RuMing ;
Wang Jian ;
Yuan Jian ;
Shan XiuMing ;
Wang XiQin .
SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (05) :1162-1171
[48]   A new public key cipher system based on image encryption [J].
Alam, MGR ;
Hassan, MM ;
Hossain, N ;
Quadir, SMM .
Proceedings of the 8th Joint Conference on Information Sciences, Vols 1-3, 2005, :1735-1738
[49]   Modification of the key schedule of the 2-GOST block cipher and its implementation on FPGA [J].
Dmukh, A. ;
Trifonov, D. ;
Chookhno, A. .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (01) :49-59
[50]   Constructing Key Dependent Dynamic S-Box for AES Block Cipher System [J].
Manjula, G. ;
Mohan, H. S. .
PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, :613-617