This paper presents a substitution-based block cipher that considers a file to be encrypted as a bit-stream. The cipher implements a storage efficient algorithm through which along with encryption a reduction in size is also achieved. As encryption is done at bit label, this algorithm can be implemented on any kind of files. A tendency of increase in execution time is observed. The proposed technique is compared with the existing International Data Encryption Algorithm (IDEA) with respect to execution time and degree of non-homogeneity. A generalized expression for the key space is formularized. Key Words: cryptography, encryption, decryption, cipher, private key, symmetric key, plain text, cryptographic modeling
A large amount of data and information is sent and received everyday via the Internet for various pu...
Abstract: With the development of the digital devices, computers and networks, our world relies more...
The emerging threats to information security are increasing at an alarming rate. The most influentia...
This paper presents a block cipher based on private key to be implemented in bit-level. The scheme u...
This paper presents a process by which we can secure any kind of file. The newly developed encryptio...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
In this paper we have developed a new symmetric key algorithm for encryption and decryption of data ...
Nowadays, the computer network has changed the mode of people's communication. People can easil...
Abstract — This paper is presenting cryptography model of block based cipher technique. This model i...
Digital communication is becoming an essential part of modern way of life. In some cases it is desir...
584-591This paper presents a 123-bit private-key based block-cipher, RSBP, which is capable of encry...
Data transmission has become very common in human’s daily life. This data transmission can be confid...
In this paper, we have developed a large block cipher by introducing the basic concepts of permutati...
The new attack methods show some lacuna in the encryption algorithms and key schedule. As the streng...
In cryptography, encryption is the process of encoding information. This process converts the origin...
A large amount of data and information is sent and received everyday via the Internet for various pu...
Abstract: With the development of the digital devices, computers and networks, our world relies more...
The emerging threats to information security are increasing at an alarming rate. The most influentia...
This paper presents a block cipher based on private key to be implemented in bit-level. The scheme u...
This paper presents a process by which we can secure any kind of file. The newly developed encryptio...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
In this paper we have developed a new symmetric key algorithm for encryption and decryption of data ...
Nowadays, the computer network has changed the mode of people's communication. People can easil...
Abstract — This paper is presenting cryptography model of block based cipher technique. This model i...
Digital communication is becoming an essential part of modern way of life. In some cases it is desir...
584-591This paper presents a 123-bit private-key based block-cipher, RSBP, which is capable of encry...
Data transmission has become very common in human’s daily life. This data transmission can be confid...
In this paper, we have developed a large block cipher by introducing the basic concepts of permutati...
The new attack methods show some lacuna in the encryption algorithms and key schedule. As the streng...
In cryptography, encryption is the process of encoding information. This process converts the origin...
A large amount of data and information is sent and received everyday via the Internet for various pu...
Abstract: With the development of the digital devices, computers and networks, our world relies more...
The emerging threats to information security are increasing at an alarming rate. The most influentia...