Enhanced Security For Hybrid Encryption Strategies With Key Reausability

Authors

  • Narasimha Raju Dodda  Department of Computer Science and Engineering, Shri Vishnu Engineering College for Women, Bhimavaram Andhrapradesh, India
  • Katikireddy. Ratna Kumari  Department of Computer Science and Engineering, Shri Vishnu Engineering College for Women, Bhimavaram Andhrapradesh, India

Keywords:

AES, Cryptography, CAST-128, DES, Symmetric, Key, Cipher Text

Abstract

Symmetric key cryptography is a common cryptographic technique using the same key at both the transmitter and receiver side. The main advantage of symmetric key encryption is its less computational cost compared to its counterpart-public key encryption. In this work a new symmetric key encryption scheme is proposed. This proposed algorithm provides new step to avoid shortcomings. We use some famous algorithms to encrypt a data as follows. At first, we create new algorithm in order to provide security issue and time constraint of operation then we combine AES and CAST-128 algorithm, then we encrypt data using the proposed algorithm. This can enhance the security and complicates the Encryption. And the major advantage of this algorithm is key reusability. In this paper we provide both the encryption and decryption that supports in real time application and algorithm has a practical value.

References

  1. Ankid Fadia, Jaya Bhattacharjee, "Encryption, Protecting YourData", Vikash Publishing House Pvt Ltd,2007, ISBN: 812592251-2
  2. William Stallings, "Cryptography and Network Security", FifthEdition, Person,2011, ISBN 978-81-317-6166-3
  3. Mark Stamp, "INFORMATION SECURITY Principles andPractice", Second Edition, A JOHN WILEY & SONS INC.PUBLICATION,2011,
  4. Urs E. Gattiker, International School of New Media, "THEINFORMATION SECURITY DICTIONARY", KLUWERACADEMIC PUBLISHERS,ISBN: 1-4020-7889-7
  5. STEVEN FURNELL, PAUL DOWLAND, "E-mail Security APocket Guide", IT Governance Publishing, 2010, ISBN 978-1-84928-097-6
  6. David Harley, Robert Slade, Urs Gattiker, "Viruses Revealed",Osborne/McGraw-Hill
  7. Bradley Dunsmore, Jeffrey W. Brown, Michael Cross, "MISSIONCRITICAL! INTERNET SECURITY", Syngress Publishing Inc.,2001, ISBN: 1-928994-20-2
  8. Fauzan Mirza, "Block Ciphers And Cryptanalysis" PhD Thesis,Department of Mathematics, Royal Holloway University of London,2001
  9. Paul C. Kocher, "Timing Attacks on Implementations of Diffe-Hellman, RSA, DSS, and Other Systems", Cryptography ResearchInc., San Francisco, USA.
  10. T.SubhamastanRao, M.Soujanya, T.Hemalatha, T.Revathi, "Simultaneous data compression and encryption" (IJCSIT) International Journal of Computer Science and Information Technologies, ISSN 0975-9646, Volume-2(5), 2011.
  11. Senthil Shanmugasundaram, Robert Lourdusamy "A Comparative Study Of Text Compression Algorithms" International Journal of Wisdom Based Computing, Vol. 1 (3), December 2011.
  12. Harshraj N. Shinde, Aniruddha S. Raut, Shubham. Vidhale, Rohit V. Sawant, Vijay A. Kotkar "A Review of Various Encryption Techniques" International Journal of Engineering And Computer Science ISSN: 2319-7242, Volume 3, Issue 9, September 2014.
  13. Ms. Ayushi Aggarwal, Anju "Enciphering Data for Larger Files" International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 3, Issue 5, May 2013.
  14. Haroon Altarawneh, Mohammad Altarawneh "Data Compression Techniques on Text Files: A Comparison Study" International Journal of Computer Applications, (0975 ? 8887), Volume 26? No.5, July 2011.
  15. MohiniChaudhari, Dr. KanakSaxena "Fast and Secure Data Transmission using Symmetric Encryption and Lossless Compression" International Journal of Computer Science and Mobile Computing, ISSN 2320?088X, Vol. 2, Issue. 2, February 2013.
  16. "Data Compression" by Behrouz Forouzan.
  17. "Huffman Compression" by webopedia.
  18. Yu-Yun Chang "Tutorial: Arithmetic Coding".
  19. T.D.B Weerasinghe "Analysis of a Modified RC4 Algorithm" International Journal of Computer Applications, ISSN0975 ? 8887, Volume 51? No.22, August 2012.
  20. AL.Jeeva, Dr.V.Palanisamy, K.Kanagaram "Comparative Analysis of Performance Efficiency and Security Measures of Some Encryption Algorithms" International Journal of Engineering Research and Applications (IJERA), ISSN: 2277 128X, Volume 3, Issue 6, June 2013.
  21. Mr. Vinod Saroha, Suman Mor, Anurag Dagar "Enhancing Security of Caesar Cipher by Double Columnar Transposition Method" International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 2, Issue 10, 2012.
  22. Sombir Singh, Sunil K. Maakar, Dr.Sudesh Kumar "Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques" International Journal of Advanced Research in Computer Science and Software Engineering, ISSN 2249-6343, Volume 2, Issue 1, Jan 19 2012.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Narasimha Raju Dodda, Katikireddy. Ratna Kumari, " Enhanced Security For Hybrid Encryption Strategies With Key Reausability, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 6, pp.345-350, July-August-2017.