An Efficient Approach for Increasing Security to Symmetric Data Encryption

被引:0
|
作者
Islam, Muhammad Nazrul [1 ]
Mia, Md. Monir Hossain [2 ]
Islam, Md. Foizul [2 ]
Matin, M. A. [1 ]
机构
[1] Khulna Univ Engn Technol KUET, Dept Comp Sci & Engn, Khulna, Bangladesh
[2] BRAC Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2008年 / 8卷 / 04期
关键词
Computer Security; Block cipher; plain text; cipher text; Differential cryptanalysis; Linear cryptanalysis; Symmetric Encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithm uniquely defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. Data encryptions standard (DES) use64 bits block size as well as 64 bits key size that are vulnerable to brute-force, attack. But for both efficiency and security a larger block size is desirable. The Advanced Encryption Standard (AES), which use 128 block size as well as 128 bits key size, is using as an encryption standard now. In this paper, we propose an algorithm which is higher secure than Rijndael algorithm but less efficient than that. The difference of efficiency between Rijndael and our propose algorithm is very negligible. We explain all this term in this paper.
引用
收藏
页码:16 / 20
页数:5
相关论文
共 50 条
  • [41] A novel energy-efficient encryption algorithm for secure data in WSNs
    Hayouni, Haythem
    Hamdi, Mohamed
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (05) : 4754 - 4777
  • [42] Symmetric Encryption M Algorithm for non-letter language information
    Li, SD
    Qin, Z
    Dou, JW
    COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 210 - 213
  • [43] SSKA: secure symmetric encryption exploiting Kuznyechik algorithm for trustworthy communication
    Das, Rupayan
    Khan, Angshuman
    Arya, Rajeev
    Ilkhom, Boykuziev
    Bakhtiyor, Abdurakhimov
    Safoyev, Nuriddin
    Khudoykulov, Zarif
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024, 15 (06) : 2391 - 2400
  • [44] A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices
    Rajesh, Sreeja
    Paul, Varghese
    Menon, Varun G.
    Khosravi, Mohammad R.
    SYMMETRY-BASEL, 2019, 11 (02):
  • [45] An Approach to ensure Security through Bit-level Encryption with Possible Lossless Compression
    Paul, Pranam
    Dutta, Saurabh
    Bhattacharjee, A. K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (02): : 291 - 299
  • [46] Routing and Data Security Scheme Based on Double Encryption in Mobile Ad Hoc Networks
    Wu, Xuewen
    Zhu, Xiaokai
    Kong, Fei
    2015 FIFTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2015, : 1787 - 1791
  • [47] A New Symmetric Digital Video Encryption Model
    Kordov, Krasimir
    Dimitrov, Georgi
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (01) : 50 - 61
  • [48] Symmetric keyring encryption scheme for biometric cryptosystem
    Lai, Yen-Lung
    Hwang, Jung Yeon
    Jin, Zhe
    Kim, Soohyong
    Cho, Sangrae
    Teoh, Andrew Beng Jin
    INFORMATION SCIENCES, 2019, 502 : 492 - 509
  • [49] ALGORITHM SUBSTITUTION ATTACKS ON SYMMETRIC ENCRYPTION: A SURVEY
    Carnemolla, D.
    DI Raimondo, M.
    MATEMATICHE, 2024, 79 (02): : 477 - 503
  • [50] Implementation of Efficient Mix Column Transformation for AES encryption
    Priya, S. Sridevi Sathya
    Junias, M.
    Jenifer, Sarah S.
    Lavanya, A.
    2018 4TH INTERNATIONAL CONFERENCE ON DEVICES, CIRCUITS AND SYSTEMS (ICDCS), 2018, : 95 - 100