Open Access Open Access  Restricted Access Subscription or Fee Access

Study and Analysis of a New Data Encryption Technique Using Special Symbols Shifting

Sayani Manna, Satarupa Chatterjee, Tuhina Koley, Monali Mukherjee, Sanjay Chakraborty

Abstract


This paper is a contribution to the field of network security.It states a new technique named “Symbol Shifting Cipher” for encryption and decryption to prevent unauthorized access of data.It states a new encryption technique for secure data transmission.This paper describes that the alphabets, digits and space between the words of the plain text are replaced by their corresponding ASCII values and by some assigned symbols.These symbols are then represented in (nXn) matrix where each elements of the matrix are shifted to their corresponding columns.Then the elements of the (nXn) matrix are written in a sequence and again are replaced by corresponding ASCII values and alphabets, digits, space to create the final cipher text.This paper also compares this new cipher technique with some others renowned cipher techniques (such as Ceaser cipher, Vernam cipher) with respect to their complexity of the techniques and the probability to break the cipher code.

Keywords


Cryptography, Symbol Shifting, Encryption, Decryption.

Full Text:

PDF

References


Serge Vaudenay, Ecole Normale Superieure-CNRC,”On the security of CS-Cipher” sarge.vaudenay@ens.fr.

“Comparision based Analysis of Different Cryptographic and Encryption Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)”, IJCSI, VOL. 9.Issue, No.2, January 2012, ISSN (online):1694-0814.

H.Agrawal, M.Sharma, E & Tc. Department, SSCET, Bhilai-490020, Chattisgarh, India, “Implementation and analysis of various symmetric cryptanalysis”.

Dr. A.J. An Wang, IT 6823:Graduate Student Research Paper PASSIVE ATTACK AGAINST COMPUTER NETWORKS, PATRI GARBIN IT 6823-Information, Spring 2004.

S.G. Srinkantaswamy, Prof.H.D. Phaneendra, International Journal of Computer Application (0975-8887), Vol. 29-No.8,September 2011.

Cryptology & physical and Physical Security: Rights Amplification in Master – Keyed Mechanical Locks, Mall Blaze AT&T Labs-Research,mab@crypto.com,mab@reaearch.att.com

M. Dworkin, recommendation for Block Cipher Modes of Operation, Methods & Techniques, NIST (National Institute of Standards & Technology Administration U.S. Department of Commerce).

A. Kahate , “Cryptography and Network Security”, published by Tata McGraw Hill Education Ltd., ISBN:0-07-064823-9, 2008.

Wikipedia on cipher techniques, http://en.wikipedia.org/wiki/Cipher.

M.J.Justin and S. Manimurugan, “ A Survey on Various Encryption Techniques”, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-2, Issue-1, March 2012.

V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani, “A Modified Playfair Cipher for a Large Block of Plaintext”, International Journal of Computer Theory and Engineering, Vol. 1, No. 5, December 2009.

V. Radhakrishnan and Dr. S. Venkatachalam, “Novel information security model using proposed e-cipher method with combining the features of cryptic-steganography”, IJCSI International Journal of Computer Science Issues, ISSN (Online): 1694-0814, Vol. 8, Issue 5, No 2, September 2011.

V.V.Yaschenko, “Cryptography: An Introduction”, ISBN: 0-8218-2986-6.

G.A.Apparao, R. Bhadri, P.Reddy and V. Vardhan, “Decipherment of Substitution cipher Using Enhanced Probability Distribution”, International Journal of Computer Application (IJCA), No.8, 2010.

Piper, Fred and S. Murphy, “Cryptography : A Very Short Introduction”, ISBN 0-19-280315-8.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.