09-08-2012, 01:39 PM
New Symmetric key Cryptographic algorithm using combined bit
manipulation and MSA encryption algorithm: NJJSAA symmetric key
algorithm
New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA.....pdf (Size: 176.37 KB / Downloads: 27)
Abstract
In the present work the authors have
introduced a new advanced symmetric key
cryptographic method called NJJSAA. The authors
introduced new bit manipulation method for data
encryption and decryption of any file. Nath et al
already developed some symmetric key
methods[1,2,3,4] where they have used some
randomized key matrix for encryption and
decryption methods. In the present work the
authors have used a bit manipulation method
which include bit exchange, right shift and XOR
operation on the incoming bits. To exchange bits
the authors used a randomized key matrix of size
(16x16) using the method developed by Nath et
al(1). The present method allows the multiple
encryption and multiple decryption. To initiate the
encryption process a user has to enter a text-key
which may be maximum of 16 characters long.
From the text-key the authors have calculated
randomization number and the encryption
number. The method used was developed by Nath
et al(1). A slight change in the text-key will change
the randomization number and the encryption
number quite a lot. Multiple encryption using bit
exchange, bit right shift and XOR operations
makes the system very secured. The present
method is a block cipher method and it can be
applied to encrypt data in sensor network or in
mobile network. The advantage of the present
method is that one can apply this method on top of
any other standard algorithm such as DES, AES or
RSA. The method is suitable to encrypt any large
or small file. There is a scope to further enhance
the present method of encryption.
[Keywords: MSA Algorithm, Encryption, Decryption,
XOR, Right Shift, Left Shift] (Abstract)
I. INTRODUCTION
The massive development in internet technology
in the last few years now it is a real challenge for
the sender to send confidential data from one
computer to another computer. There is no
guarantee that between sender and receiver there
is no one is intercepting those confidential data
provided the data is not encrypted or properly
protected. The security originality of data has
now become a very important issue in data
communication network. One cannot send any
confidential or important message in raw form
from one computer to another computer as any
hacker can intercept that confidential message or
important message. Now it is a common practice
that the teachers are sending question papers over
the mail. Now it is not a difficult job for a hacker
to intercept that mail and retrieve the question
paper if it is not encrypted. This may be very
dangerous when someone is sending some
confidential matter over the mail such as Bank
transaction, Bank statement or any other
confidential matter. There is no guarantee that the
message will not be intercepted by anyone. This
2011 International Conference on Communication Systems and Network Technologies
978-0-7695-4437-3/11 $26.00 © 2011 IEEE
DOI 10.1109/CSNT.2011.33
125
may be further worse during e-banking or ecommerce
where the real data should not be
intercepted by any hacker. When a client is
sending some confidential matter from client
machine to another client machine or from client
machine to server then that data should not be
intercepted by someone. The data should be
protected from any unwanted intruder otherwise
any massive disaster may happen all on a sudden.
The disaster may happen if a sales manager of a
company is sending some crucial data to his
Managing Director related sales issue over the email.
Suppose some intruder has intercepted that
data from the internet and pass it to some other
rival company. It is possible when the data
moving from one computer to
other computer is totally
unprotected or not encrypted.
To get rid of this problem one
has to send the encrypted text
or cipher text from client to
server or to another client. Because of this
hacking problem now a days network security
and problem now a days network security and
cryptography is an emerging research area where
the people are trying to develop some good
encryption algorithm so that no intruder can
intercept the encrypted message. The so called
classical cryptographic algorithm can be
classified into two categories: (i) symmetric key
cryptography where one key is used for both
encryption and decryption purpose. (ii) Public
key cryptography where two different keys are
used one for encryption and the other for
decryption purpose. The merits of symmetric key
cryptography is that the key management is very
simple as one key is used for both encryption as
well as for decryption purpose. In case of
symmetric key cryptography the key must be
secret. In public key cryptography the encryption
key remains as public but the decryption key
should be kept as secret key. The public key
methods have got both merits as well as demerits.
The problem of Public key cryptosystem is that
one has to do massive computation for encrypting
any plain text. Moreover in some public key
cryptography the size of encrypted message may
increase. Due to massive computation the public
key crypto system may not be suitable in security
of data in sensor networks. So the security
problem in sensor node is a real problem. The
present work we are proposing a symmetric key
method called NJJSAA method which can be
applied in sensor network, mobile network, ATM
network.
Now we will describe our new advanced
symmetric key cryptography. The present method
is fully dependent on the text-key which is any
string of maximum length 16 characters long.
From the text-key we calculate two important
parameters (i) Randomization number and (ii)
Encryption number. To calculate this two
parameters we use the method developed by Nath
et al(1). We are giving below how we calculate
the above two parameters: