Modular Encryption Algorithm for Secure Data Transmission
Keywords:
Cryptanalysis, Cryptography, Deciphering, Enciphering, Intruder, Tri-modular matrixAbstract
Information is a strategic resource. Information technology and business transactions are becoming inextricably interwoven, where security for the data and concealed data transmission are made mandatory. Cryptography can be considered as the principle means of providing the data security. In this paper authors have proposed a new symmetric block cipher named Modular Encryption Algorithm with an acronym MEA which uses tri-modular matrix for its key generation, a set of operations on a matrix, Permutations and Substitutions for its encryption and decryption. As part of operations required in MEA authors have proposed M-Box, the functionality is described in this paper. The multilevel cipher rounds used in this algorithm can enhance the security such that even an intruder intercepts the message, it could be difficult to decipher the message. The strength of this algorithm has been analyzed over differential cryptanalysis. This algorithm undoubtedly follows the Strict Plaintext Avalanche Criterion (SPAC) and Strict Key Avalanche Criterion (SKAC) - the Shannon’s property of “Confusion” and “Diffusion”, the results are tabulated in this paper.
References
P. Sri Ram Chandra, G.Venkateswara Rao,G.V.Swamy,‘Ultramodern Encryption Standard Cryptosystem using Prolic Series for Secure Data Transmission’, International Journal of Latest Engineering Research and Applications (IJLERA) ISSN: 2455-7137 Volume – 02, Issue – 11, November – 2017, PP – 29-35.
Zirra Peter Buba & Gregory Maksha Wajiga.: Cryptographic Algorithms for Secure Data Communication. In: International Journal of Computer Science and Security (IJCSS), Volume (5): Issue (2): 2011.
A.Kahate, cryptography and network security (Third Edition). New Delhi: Tata McGraw Hill.2008.
Stallings, William, cryptography and network Security (6th edition.). Upper Saddle River, N.J.: Prentic Hall. pp. 67–68.
Delfs, Hans &Knebl, Helmut (2007). "Symmetric-key encryption". Introduction to cryptography: principles and applications. Springer. ISBN 9783540492436.
Matt J. B. Robshaw, Stream Ciphers Technical Report TR-701, version 2.0, RSA Laboratories, 1995
Solomon Kullback, Model Based Interface in the Life Sciences: A Primer on Evidence (New York: Springer 2008-01-01) 51-82.
Chandrasekaran J. et al. (2011): A Chaos Based Approach for Improving Non Linearity in the S-Box Design of Symmetric Key Cryptosystems in Meghanathan N. et al. Advances in Networks and Communications: First International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January2-4, 2011. Proceedings, Part 2. Springer. P.516.
Norman D. Jorstad.: Cryptographic Algorithm Metrics, January 1997.
Michael sipser, Introduction to the theory of Computation (Second Edition).
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.