An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm , Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm

Full Text (PDF, 397KB), PP.1-9

Views: 0 Downloads: 0

Author(s)

Somdip Dey 1,* Joyshree Nath 2 Asoke Nath 1

1. Department of Computer Science, St. Xavier’s College [Autonomous], Kolkata, India

2. A.K. Chaudhuri School of IT, Calcutta University, Kolkata, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2012.05.01

Received: 10 Jan. 2012 / Revised: 4 Mar. 2012 / Accepted: 1 Apr. 2012 / Published: 8 May 2012

Index Terms

Caesar Cipher, TTJSA, MSA, NJJSAA, UES, DJMNA, Cryptography

Abstract

In this paper the authors present a new integrated symmetric-key cryptographic method, named SJA, which is the combination of advanced Caesar Cipher method, TTJSA method, Bit wise Rotation and Reversal method. The encryption method consists of three basic steps: 1) Encryption Technique using Advanced Caesar Cipher, 2) Encryption Technique using TTJSA Algorithm, and 3) Encryption Technique using Bit wise Rotation and Reversal. TTJSA Algorithm, used in this method, is again a combination of generalized modified Vernam Cipher method, MSA method and NJJSAA method. Nath et al. already developed some symmetric key encryption methods namely MSA, DJSA, DJJSA, modified DJJSA, NJJSA, TTJSA, TTSJA, DJMNA, UES-I, UES-II etc. The cryptanalysis shows that TTJSA is free from standard cryptographic attacks such as differential attack, plain text attack or any brute force attack. In the present method the authors have used advanced modified Caesar Cipher method where the authors have modified the standard Caesar Cipher method and then they applied TTJSA method to make the entire crypto system very hard to break. The present method has been tested on different plain text specially with repeated character and the spectral analysis of the plain text and the encrypted is also been shown. The spectral analysis shows that the present cryptography method, SJA can not be broken with any kind of standard cryptography attack. The authors propose that the present method will be most suitable for password, SMS or any kind of small message encryption.

Cite This Paper

Somdip Dey, Joyshree Nath, Asoke Nath, "An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm", International Journal of Modern Education and Computer Science (IJMECS), vol.4, no.5, pp.1-9, 2012. DOI:10.5815/ijmecs.2012.05.01

Reference

[1]http://www.purdue.edu/discoverypark/gk12 / downloads/Cryptography.pdf
[2]Symmetric key cryptosystem using combined cryptographic algorithms - Generalized modified Vernam Cipher method, MSA method and NJJSAA method: TTJSA algorithm " Proceedings of Information and Communication Technologies (WICT), 2011 " held at Mumbai, 11th – 14th Dec, 2011, Pages:1175-1180
[3]Symmetric Key Cryptography using Random Key generator: Asoke Nath, Saima Ghosh, Meheboob Alam Mallik: "Proceedings of International conference on security and management(SAM'10" held at Las Vegas, USA Jull 12-15, 2010), P-Vol-2, 239-244(2010).
[4]New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm: Neeraj Khanna,Joel James,Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti and Asoke Nath : Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 03-06 June 2011, Page 125-130.
[5]Advanced Symmetric key Cryptography using extended MSA method: DJSSA symmetric key algorithm: Dripto Chatterjee, Joyshree Nath, Soumitra Mondal, Suvadeep Dasgupta and Asoke Nath, Jounal of Computing, Vol3, issue-2, Page 66-71,Feb(2011)
[6]A new Symmetric key Cryptography Algorithm using extended MSA method :DJSA symmetric key algorithm, Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta and Asoke Nath : Proceedings of IEEE CSNT-2011 held at SMVDU(Jammu) 3-5 June,2011, Page-89-94(2011).
[7]Symmetric key Cryptography using modified DJSSA symmetric key algorithm, Dripto Chatterjee, Joyshree Nath, Sankar Das, Shalabh Agarwal and Asoke Nath, Proceedings of International conference Worldcomp 2011 held at LasVegas 18-21 July 2011, Page-306-311, Vol-1(2011).
[8]An Integrated symmetric key cryptography algorithm using generalized vernam cipher method and DJSA method: DJMNA symmetric key algorithm : Debanjan Das, Joyshree Nath, Megholova Mukherjee, Neha Chaudhury and Asoke Nath: Proceedings of IEEE International conference : World Congress WICT-2011 to be held at Mumbai University 11-14 Dec, 2011, Page No.1203-1208(2011). .
[9]Symmetric key Cryptography using two-way updated – Generalized Vernam Cipher method: TTSJA algorithm, Trisha Chatterjee, Tamodeep Das, Shayan dey, Joyshree Nath, Asoke Nath , International Journal of Computer Applications(IJCA, USA), Vol 42, No.1, March, Pg: 34 -39( 2012).
[10]Ultra Encryption Standard(UES) Version-I: Symmetric Key Cryptosystem using generalized modified Vernam Cipher method, Permutation method and Columnar Transposition method, Satyaki Roy, Navajit Maitra, Joyshree Nath,Shalabh Agarwal and Asoke Nath, Proceedings of IEEE sponsored National Conference on Recent Advances in Communication, Control and Computing Technology-RACCCT 2012, 29-30 March held at Surat, Page 81-88(2012).
[11]Peter Montgomery, "Modular Multiplication Without Trial Division," Math. Computation, Vol. 44, pp. 519–521, 1985.
[12]W. Hasenplaugh, G. Gaubatz, and V. Gopal, "Fast Integer Reduction," 18th IEEE Symposium on Computer Arithmetic (ARITH '07), pp. 225– 229, 2007.
[13]Panduranga H T, Naveenkumar S K, "An image encryption approach using bit-reversal method ", NCIMP 2010, pp.181-183.