Dual CBC Encryption Algorithm
Citation
Omprakash Kar, Manoranjan Panda "Dual CBC Encryption Algorithm", International Journal of Engineering Trends and Technology (IJETT), V48(5),258-268 June 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Abstract
Now-a-days we are enveloped by technologies and data is an essential part of any technology. It is obvious that communication between different clients is an important aspect of any system. Thus data are sent in between different clients to accomplish communication. After a plaintext is encrypted and cipher text is found, the cipher text is made to transmit over an unsecure channel. Encryption techniques are basically divided into two types: Symmetric key encryption and Asymmetric Key encryption. Symmetric key encryption is usually preferred over asymmetric key due to its fastness, low complexity, lesser computational burden and use of one key for both encryption and decryption process. Previously different encryption algorithms were developed i.e. DES, 3DES, AES and RC2 as symmetric key and Diffie-Hellman and RSA as asymmetric key algorithms. In this paper we have developed an encryption algorithm “Dual CBC Encryption Algorithm (DCEA)” which uses a twice implementation of Cipher Block Chaining (CBC) once in practical order and other in reverse order of the outputted cipher text. The use of XOR operation eases the hardware implementation, consumption of lesser computational power, smaller complexity and easy encryption and decryption processes. The key used here could be of any length but it is preferred to select a key between 4 Bytes and 16 Bytes. On comparison of Avalanche Effect with the other basis Algorithms like Blowfish, 3DES, DES, RC2 and AES algorithm DCEA has a much better value. Moreover DCEA is trustworthy to several attacks like frequency analysis attack, cipher text only attacks, known plaintext attack and chosen plaintext attack. In addition to that the algorithm has better encryption time in comparison to DCA encryption algorithm. The experimental and analytical results described in further sections of this paper give stronger proof to DCEA’s strength.
References
[1] Daniar Heri Kurniawan and Rinaldi Munir “ Double Chaining Algorithm - A Secure Symmetric-key Encryption Algorithm” IEEE conference on Advanced Informatics: Concepts, Theory And Application (ICAICTA), 16-19 Aug. 2016, George Town, Malaysia.
[2] Tingyuan Nie, Chuanwang Song and Xulong Zhi, "Performance Evaluation of DES and Blowfish Algorithms", IEEE International Conference on Biomedical Engineering and Computer Science (ICBECS- 2010), pp. 1-4, 23-25 Apr 2010.
[3] Dr.Madhu Goel, Rupinder Kaur, "A Review of Some Popular Encryption Techniques", International Journal of Software and Web Sciences, 8(1), March-May 2014, pp. 41-45
[4] Ali Ahmad Milad, Hjh Zaiton Muda,Zul Azri Bin Muhamad Noh, Mustafa Almahdi Algaet, “Comparative Study of Performance in Cryptography Algorithms (Blowfish and Skipjack)”, J. Computer Sci., 8 (7): 1191-1197, 2012
[5] Omari H. Ahmed, Al-Kasasbeh M. Basil, Al-Qutaish E. Rafa, Muhairat I. Muhammad, 2008, “A New Cryptographic Algorithm for the Real Time Applications “,Proceedings of the 7th WSEAS International Conference on INFORMATION SECURITY and PRIVACY (ISP `08)
[6] C. E. Shannon “Communication Theory of Secrecy Systems”, Bell Systems Tech. Jr. Vol 28, pages 656-715, 1949
[7] Alan Kaminsky, Michael Kurdziel, Stanis?aw Radziszowski “An Overview of Cryptanalysis Research for the Advanced Encryption Standard” IEEE conference on MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010, 31 Oct.-3 Nov. 2010, San Jose, CA, USA
[8] Prerna Mahajan, Abhishek Sachdeva. “A Study of Encryption Algorithms AES, DES and RSA for Security”. Global Journal of Computer Science and Technology Network, Web & Security, ISSN: 0975-4350, Volume 13, Issue 15, Version 1.0, March 2013. Global Journals Inc. (USA)
[9] Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud, "Performance Evaluation of Symmetric Encryption Algorithms", IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, pp. 280-286, December 2008.
[10] Feistel, Horst (1973) “Cryptography and Computer Privacy". Scientific American 228
[11] Simar Preet Singh and Raman Maini “Comparison Of Data Encryption Algorithms”, International Journal of Computer Science and Communication, Vol. 2, No. 1, January-June 2011, pp. 125-127
[12] M. Anand Kumar and Dr.S.Karthikeyan “Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms”, I. J. Computer Network and Information Security, March 2012, pp. 22-28
[13] Sombir Singh, Sunil K Maakar and Dr. Sudesh Kumar “A Performance Analysis of DES and RSA Cryptography”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 2, Issue 3, May – June 2013
[14] Milind Mathur, Ayush Kesarwani “Comparison between DES, 3DES, RC2, RC6, Blowfish and AES”, National Conference on New Horizons in IT - NCNHIT 2013, pp. 79-6 [15] K. F. Man, K. S. Tang, S. Kwong “Genetic Algorithms: Concepts and Applications”, IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 43, No. 5, OCTOBER 1996
Keywords
Avalanche Effect, Chosen Plaintext Attack, Cipher Text Only Attack, Encryption Time, Frequency Analysis Attack, Known Plaintext Attack, Symmetric Key Algorithm, Throughput.