A Bit Level Session Based Encryption Technique to Enhance Information Security
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 2
Abstract
In this paper, a session based symmetric key cryptographic system has been proposed and it is termed as Bit Shuffle Technique (BST). This proposed technique is very fast, suitable and secure for encryption of large files. BST consider the plain text (i.e. the input file) as binary string with finite no. of bits. The input binary string is broken down into manageable-sized blocks to fit row-wise from left to right into a square matrix of suitable order. Bits are taken diagonally upward from the square matrix to form the encrypted binary string and from this string cipher text is formed. Combination of values of block length and no. of blocks of a session generates the session key for BST. For decryption the cipher text is considered as binary string. Using the session key information, this binary string is broken down into manageable-sized blocks to fit diagonally upward from left to right into a square matrix of suitable order. Bits are taken row-wise from left to right from the square matrix to form the decrypted binary string and from this string plain text is formed. A comparison of BST with existing and industrially accepted TDES and AES has been done.
Authors and Affiliations
Manas Paul , Jyotsna Kumar Mandal
Public key cryptosystem and a key exchange protocol using tools of non-abelian group
Public Key Cryptosystems assure privacy as well as integrity of the transactions between two parties. The sizes of the keys play an important role. The larger the key the harder is to crack a lock of encrypted data. We...
A Bit Level Session Based Encryption Technique to Enhance Information Security
In this paper, a session based symmetric key cryptographic system has been proposed and it is termed as Bit Shuffle Technique (BST). This proposed technique is very fast, suitable and secure for encryption of large files...
ONLINE PRACTICUM MONITORING SYSTEM FOR LYCEUM OF THE PHILIPPINES UNIVERSITY BATANGAS CAMPUS
The main objective of this study to make the monitoring procedure trouble-free by developing a system which would be accessible through the internet. Students will have their own user accounts which will give them the ca...
Optimal Feed Forward MLPArchitecture for Off-Line Cursive Numeral Recognition
The purpose of this work is to analyze the performance of back-propagation feed-forward algorithm using various different activation functions for the neurons of hidden and output layer and varying the number of neurons...
Generalisation of RSA Scheme using fundamental groups and ZKIP
We address the problem of computation involved in RSA algorithm namely exponentiation under modulo arithmetic and various mathematical and timing attacks in RSA. The computation is made easy and quick by assigning elemen...