Open Access Open Access  Restricted Access Subscription or Fee Access

Textual Encryption using Conventional Encryption Algorithm

M. Madhavi, B. Vijay Kumar, Dr.V.S. Giridhar Akula

Abstract


In this paper, we propose an efficient usage of an available conventional encryption algorithm IDEA for encrypting plain text of fixed length into plaintext of same length usually called as Cipher by using a plain text of fixed length called Main key. IDEA algorithm which is a symmetric block cipher accepts 64 bit digital data as input and encrypts the same into a cipher of same 64 bit digital data. Aside from the basic characteristics of IDEA, i.e. the input of 64 bit digital data and 128 bit key, our proposed work accepts a plain text of 80 characters as input and encrypts the same into another text of 80 characters using 16 text characters as main key. Furthermore, we demonstrated the results of implementation of IDEA structure on to a Field Programmable Gated Array with various performance parameters.

Keywords


Idea, Textual Encryption, Data Security, FPGA, VHDL, Architecture

Full Text:

PDF

References


National Bureau of Standards, U.S. Department of Commerce. Data encryption standard, January 1977.

X. Lai and J. Massey. A proposal for a new block encryption standard. In Proceedings of the EUROCRYPT 90 Conference, pages 389–904, 1990

Jean-Luc Beuchat and Jean-Michel Muller. Modulo m multiplication-addition: Algorithms and FPGA implementation. Electronics Letters, 40(11):654–655, May 2004.

M. SAEB, A. BAITH, ―An Encryption Algorithm for Data Security,‖ Recent Advances in Information Science & Technology, N.E. Mastorakis, (editor), World Scientific Publishing Company, pp. 350-354, 1998.

Alfred J. Menezes et al., Handbook of Applied Cryptography, CRC Press, 1997.

O. Y. H. Cheung, K. H. Tsoi, P. H. W. Leong, and M. P. Leong. Tradeoffs in parallel and serial implementations of the international data encryption algorithm IDEA. Lecture Notes in Computer Science, 2162:333, 2001

Scneier, B. Applied Cryptography, New York: Wiley, 1996

Mel, H.X. Baker, D. Cryptography Decrypted. Addison Wesley, 2001

http://www.simonsingh.net/The_Black_Chamber/Swapping_Cipher_Alphabets.html

Himanshu Gupta , a Patent titled as "A Technique & Device for Multiphase Encryption" in International Journal of Patent Department,Govt.ofIndia(December,2010)

H. Feistel, "Cryptography and computer privacy," Sci. Amer., vol. 228, no. 5, pp. 15-23, May 1973.

W. Diffie, M. Hellman, "Exhaustive cryptanalysis of the NBS data encryption standard," Computer, pp. 74-78, June 1977.

"Interoperability and security requirements for use of the data encryption standard with CCITT group 3 facsimile equipment," Federal Standard 1028, General Services Administration, Washington, DC, Apr. 1985

Computer Security Act of 1987, PL 100-235.

D. Branstad, J. Gait, and S. Katzke, "Report on the workshop on cryptography in support of computer security", Sept. 21-22, 1976, NBSIR-771291, Sept.1977.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.