Full Paper View Go Back
Modular Encryption Algorithm for Secure Data Transmission
P.Sri Ram Chandra1 , G. Venkateswara Rao2 , G.V. Swamy3
1 Dept. of CSE, GITAM-Deemed to be University, Visakhapatnam, INDIA.
2 Information Technology Department, GITAM-Deemed to be University, Visakhapatnam, INDIA.
3 Electronics and Physics Department, GITAM-Deemed to be University, Visakhapatnam, INDIA.
Correspondence should be addressed to: psrgietcse@gmail.com.
Section:Research Paper, Product Type: Journal
Vol.6 ,
Issue.1 , pp.12-22, Feb-2018
CrossRef-DOI: https://doi.org/10.26438/ijsrnsc/v6i1.1222
Online published on Feb 28, 2018
Copyright © P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy, Modular Encryption Algorithm for Secure Data Transmission, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.12-22, 2018.
MLA Style Citation: P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy "Modular Encryption Algorithm for Secure Data Transmission." International Journal of Scientific Research in Network Security and Communication 6.1 (2018): 12-22.
APA Style Citation: P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy, (2018). Modular Encryption Algorithm for Secure Data Transmission. International Journal of Scientific Research in Network Security and Communication, 6(1), 12-22.
BibTex Style Citation:
@article{Chandra_2018,
author = {P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy},
title = {Modular Encryption Algorithm for Secure Data Transmission},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {2 2018},
volume = {6},
Issue = {1},
month = {2},
year = {2018},
issn = {2347-2693},
pages = {12-22},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=315},
doi = {https://doi.org/10.26438/ijcse/v6i1.1222}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.1222}
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=315
TI - Modular Encryption Algorithm for Secure Data Transmission
T2 - International Journal of Scientific Research in Network Security and Communication
AU - P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy
PY - 2018
DA - 2018/02/28
PB - IJCSE, Indore, INDIA
SP - 12-22
IS - 1
VL - 6
SN - 2347-2693
ER -
Abstract :
Information is a strategic resource. Information technology and business transactions are becoming inextricably interwoven, where security for the data and concealed data transmission are made mandatory. Cryptography can be considered as the principle means of providing the data security. In this paper authors have proposed a new symmetric block cipher named Modular Encryption Algorithm with an acronym MEA which uses tri-modular matrix for its key generation, a set of operations on a matrix, Permutations and Substitutions for its encryption and decryption. As part of operations required in MEA authors have proposed M-Box, the functionality is described in this paper. The multilevel cipher rounds used in this algorithm can enhance the security such that even an intruder intercepts the message, it could be difficult to decipher the message. The strength of this algorithm has been analyzed over differential cryptanalysis. This algorithm undoubtedly follows the Strict Plaintext Avalanche Criterion (SPAC) and Strict Key Avalanche Criterion (SKAC) - the Shannonâs property of âConfusionâ and âDiffusionâ, the results are tabulated in this paper.
Key-Words / Index Term :
Cryptanalysis, Cryptography, Deciphering, Enciphering, Intruder, Tri-modular matrix
References :
[1]. P. Sri Ram Chandra, G.Venkateswara Rao,G.V.Swamy,âUltramodern Encryption Standard Cryptosystem using Prolic Series for Secure Data Transmissionâ, International Journal of Latest Engineering Research and Applications (IJLERA) ISSN: 2455-7137 Volume â 02, Issue â 11, November â 2017, PP â 29-35.
[2]. Zirra Peter Buba & Gregory Maksha Wajiga.: Cryptographic Algorithms for Secure Data Communication. In: International Journal of Computer Science and Security (IJCSS), Volume (5): Issue (2): 2011.
[3]. A.Kahate, cryptography and network security (Third Edition). New Delhi: Tata McGraw Hill.2008.
[4]. Stallings, William, cryptography and network Security (6th edition.). Upper Saddle River, N.J.: Prentic Hall. pp. 67â68.
[5]. Delfs, Hans &Knebl, Helmut (2007). "Symmetric-key encryption". Introduction to cryptography: principles and applications. Springer. ISBN 9783540492436.
[6]. Matt J. B. Robshaw, Stream Ciphers Technical Report TR-701, version 2.0, RSA Laboratories, 1995
[7]. Solomon Kullback, Model Based Interface in the Life Sciences: A Primer on Evidence (New York: Springer 2008-01-01) 51-82.
[8]. Chandrasekaran J. et al. (2011): A Chaos Based Approach for Improving Non Linearity in the S-Box Design of Symmetric Key Cryptosystems in Meghanathan N. et al. Advances in Networks and Communications: First International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January2-4, 2011. Proceedings, Part 2. Springer. P.516.
[9]. Norman D. Jorstad.: Cryptographic Algorithm Metrics, January 1997.
[10]. Michael sipser, Introduction to the theory of Computation (Second Edition).
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.