Modular Encryption Algorithm for Secure Data Transmission

Authors

  • P.Sri Ram Chandra Dept. of CSE, GITAM-Deemed to be University, Visakhapatnam, INDIA
  • G. Venkateswara Rao Information Technology Department, GITAM-Deemed to be University, Visakhapatnam, INDIA
  • G.V. Swamy Information Technology Department, GITAM-Deemed to be University, Visakhapatnam, INDIA

Keywords:

Cryptanalysis, Cryptography, Deciphering, Enciphering, Intruder, Tri-modular matrix

Abstract

Information is a strategic resource. Information technology and business transactions are becoming inextricably interwoven, where security for the data and concealed data transmission are made mandatory. Cryptography can be considered as the principle means of providing the data security. In this paper authors have proposed a new symmetric block cipher named Modular Encryption Algorithm with an acronym MEA which uses tri-modular matrix for its key generation, a set of operations on a matrix, Permutations and Substitutions for its encryption and decryption. As part of operations required in MEA authors have proposed M-Box, the functionality is described in this paper. The multilevel cipher rounds used in this algorithm can enhance the security such that even an intruder intercepts the message, it could be difficult to decipher the message. The strength of this algorithm has been analyzed over differential cryptanalysis. This algorithm undoubtedly follows the Strict Plaintext Avalanche Criterion (SPAC) and Strict Key Avalanche Criterion (SKAC) - the Shannon’s property of “Confusion” and “Diffusion”, the results are tabulated in this paper.

 

References

P. Sri Ram Chandra, G.Venkateswara Rao,G.V.Swamy,‘Ultramodern Encryption Standard Cryptosystem using Prolic Series for Secure Data Transmission’, International Journal of Latest Engineering Research and Applications (IJLERA) ISSN: 2455-7137 Volume – 02, Issue – 11, November – 2017, PP – 29-35.

Zirra Peter Buba & Gregory Maksha Wajiga.: Cryptographic Algorithms for Secure Data Communication. In: International Journal of Computer Science and Security (IJCSS), Volume (5): Issue (2): 2011.

A.Kahate, cryptography and network security (Third Edition). New Delhi: Tata McGraw Hill.2008.

Stallings, William, cryptography and network Security (6th edition.). Upper Saddle River, N.J.: Prentic Hall. pp. 67–68.

Delfs, Hans &Knebl, Helmut (2007). "Symmetric-key encryption". Introduction to cryptography: principles and applications. Springer. ISBN 9783540492436.

Matt J. B. Robshaw, Stream Ciphers Technical Report TR-701, version 2.0, RSA Laboratories, 1995

Solomon Kullback, Model Based Interface in the Life Sciences: A Primer on Evidence (New York: Springer 2008-01-01) 51-82.

Chandrasekaran J. et al. (2011): A Chaos Based Approach for Improving Non Linearity in the S-Box Design of Symmetric Key Cryptosystems in Meghanathan N. et al. Advances in Networks and Communications: First International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January2-4, 2011. Proceedings, Part 2. Springer. P.516.

Norman D. Jorstad.: Cryptographic Algorithm Metrics, January 1997.

Michael sipser, Introduction to the theory of Computation (Second Edition).

Downloads

Published

2018-02-28

How to Cite

[1]
P. R. Chandra, G. V. Rao, and G. Swamy, “Modular Encryption Algorithm for Secure Data Transmission”, Int. J. Sci. Res. Net. Sec. Comm., vol. 6, no. 1, pp. 12–22, Feb. 2018.

Issue

Section

Research Article

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.