An Efficient Approach for Increasing Security to Symmetric Data Encryption

被引:0
|
作者
Islam, Muhammad Nazrul [1 ]
Mia, Md. Monir Hossain [2 ]
Islam, Md. Foizul [2 ]
Matin, M. A. [1 ]
机构
[1] Khulna Univ Engn Technol KUET, Dept Comp Sci & Engn, Khulna, Bangladesh
[2] BRAC Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2008年 / 8卷 / 04期
关键词
Computer Security; Block cipher; plain text; cipher text; Differential cryptanalysis; Linear cryptanalysis; Symmetric Encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithm uniquely defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. Data encryptions standard (DES) use64 bits block size as well as 64 bits key size that are vulnerable to brute-force, attack. But for both efficiency and security a larger block size is desirable. The Advanced Encryption Standard (AES), which use 128 block size as well as 128 bits key size, is using as an encryption standard now. In this paper, we propose an algorithm which is higher secure than Rijndael algorithm but less efficient than that. The difference of efficiency between Rijndael and our propose algorithm is very negligible. We explain all this term in this paper.
引用
收藏
页码:16 / 20
页数:5
相关论文
共 50 条
  • [31] Fully Homomorphic Encryption: An Antidote to Cloud Data Security and Privacy Concerns.
    Jubrin, Abdulahi Monday
    Izegbu, Ikechukwu
    Adebayo, Olawale Surajudeen
    2019 15TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2019,
  • [32] RESEARCH ON PRIVACY DATA SECURITY PROTECTION IN SENSOR NETWORKS USING ENCRYPTION ALGORITHMS
    Yao, Yunxia
    Peng, Renjie
    Mi, Wenli
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2024, 86 (03): : 25 - 34
  • [33] Performance Evaluation of Symmetric Encryption Algorithms
    Elminaaml, Diaa Salama Abdul.
    Kader, Hatem Mohamed Abdul
    Hadhoud, Mohie Mohamed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (12): : 280 - 286
  • [34] Practical symmetric on-line encryption
    Fouque, PA
    Martinet, G
    Poupard, G
    FAST SOFTWARE ENCRYPTION, 2003, 2887 : 362 - 375
  • [35] Practical symmetric on-line encryption
    Fouque, Pierre-Alain
    Martinet, Gwenaëlle
    Poupard, Guillaume
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2887 : 362 - 375
  • [36] Performance Evaluation of Symmetric Encryption Algorithms
    Elminaam, D. S. Abdul
    Kader, H. M. Abdul
    Hadhoud, M. M.
    INNOVATION AND KNOWLEDGE MANAGEMENT IN TWIN TRACK ECONOMIES: CHALLENGES & SOLUTIONS, VOLS 1-3, 2009, : 1001 - 1006
  • [37] Nonce-based symmetric encryption
    Rogaway, P
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 348 - 358
  • [38] A novel energy-efficient encryption algorithm for secure data in WSNs
    Haythem Hayouni
    Mohamed Hamdi
    The Journal of Supercomputing, 2021, 77 : 4754 - 4777
  • [39] An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
    Nadeem, Muhammad
    Arshad, Ali
    Riaz, Saman
    Zahra, Syeda Wajiha
    Dutta, Ashit Kumar
    Al Moteri, Moteeb
    Almotairi, Sultan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 4059 - 4079
  • [40] An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation
    Pandey, J. G.
    Gurawa, Aanchal
    Nehra, Heena
    Karmakar, A.
    2016 INTERNATIONAL CONFERENCE ON VLSI SYSTEMS, ARCHITECTURES, TECHNOLOGY AND APPLICATIONS (VLSI-SATA), 2016,