SlideShare a Scribd company logo
1 of 6
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975-0290
2694
MULTI-STAGE ENCRYPTION USING
SEEDED SDES
Dr.S.Kiran
Asst. Prof Department of Computer Science and Engineering, YSREC of Y V University, Proddatur
Email: rkirans125@gmail.com
R. Pradeep Kumar Reddy
Asst. Prof Department of Computer Science and Engineering, YSREC of Y V University, Proddatur
Email: pradeepmadhavi@gmail.com
J.Venkata Sivajaya Sree
Department of Computer Science and Engineering, YSREC of Y V University, Proddatur
Email: j.v.s.jayasree@gmail.com
D.Naga Sravanthi
Department of Computer Science and Engineering, YSREC of Y V University, Proddatur
Email: d.nsravanthi2010@gmail.com
-------------------------------------------------------------------ABSTRACT--------------------------------------------------------------
Now-a-days the usage of internet increases tremendously so, there is a need of security for the data. Cryptography
is a process of scrambling the data into unknown format which provides security to the data. Modern
cryptography is mainly based on mathematical theory and computer science practice. Cryptography process is
done with the help of encryption and decryption. The basic two ideas behind the cryptography technique are
substitution and transposition. This paper presents a multistage encryption algorithm. At the end of each stage an
intermediate cipher is produced. The key is generated by using SEEDED SDES algorithm. Final cipher text is
derived from the local binary pattern (LBP).
Keywords - Decryption, Encryption, Railference, SEEDED SDES key generation, Substitution, Transposition.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: July 31, 2015 Date of Acceptance: Sep 09, 2015
--------------------------------------------------------------------------------------------------------------------------------------------------
1. INTRODUCTION
Cryptography is the practice and study of techniques for
secure communication in the presence of third parties.
Cryptography means, a method of transmitting data in
sandwiched between a two persons, i.e. those (sender) for
whom (receiver) can only read and process the data. A
message in its original format, readable by an attacker is
plaintext[1] .A message is changed to be unreadable
format by sender to anyone except the intended recipient is
cipher text. The term is most often associated with
encryption and decryption. The scrambling of original text
(plain text) into cipher text is known as encryption, and
then back again is known as decryption.
The main traditional cipher types are transposition
ciphers and substitution ciphers. A transposition cipher is
one, which rearranges the order of letters in a message.
For example ‘computers’ becomes ‘pmocusret’. The
cipher, which systematically replaces letters or groups of
letters with other letters or group of letters, is referred as
substitution cipher. For example: ’talk less work more’
becomes ‘ubml mftt npsf’. An early substitution cipher
was the caeser cipher, in which each letter in the plaintext
was replaced by a letter with some fixed number of
positions further down the alphabet[2]. Application of
cryptography includes ATM cards, computer passwords
and electronic commerce.
In the 20th
century, cryptography was predominantly
concerned with linguistic (scientific study of language)
and lexicographic patterns (greedily generated error-
correction codes). Then the emphasis has shifted, and
cryptography now makes extensive use of mathematics,
including aspects of information theory ( branch of
applied mathematics, electrical engineering and computer
science), computational complexity(theory of
computation), statistics, combinatory(countable discrete
structures), abstract algebra, number theory(pure
mathematics) and finite mathematics generally[3].
1.1. Background
The word cryptography is derived from the Greek
language ‘kryptos’ means “hidden” or “secret”.
At 2000bc cryptography was origined with the egyptian
practice of hieroglyphics, which consist of complex
pictograms. The first known use of a modern cipher was
by julius Caesar. Julius Caesar created a system in which
each character in his message was replaced by a character
three positions ahead of it in the roman alphabet, why
because he did not trust his messengers when
communicating with his governors and officers.
The cryptosystem services are data confidential, data
integrity, authentication and non-repudiation. Data
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975-0290
2695
Confidentiality is a set of rules, which imposes access
limits and restrictions on the information. The main aim of
Data integrity is to prevent unintentional changes to
information and the control of protecting data from
unauthorized parties. Authentication performs the
conformation of truth attribute of a single piece of data or
entity.
Now a days cryptography has crooked into a
battleground of the world’s best mathematics and
computer scientists. The ability to securely store and
transfer sensitive information has proved a critical factor
in success in war and business[3].
1.2 Types of cryptography
1.2.1 Symmetric key cryptography
In the simpler types of cryptography, the same key is used
to encrypt and decrypt the data. Some of the symmetric
algorithms are DES, 3DES, AES, IDES, RC4, RC5.
Fig 1.1: Symmetric key cryptography.
1.2.2 Asymmetric key cryptography
In this type of cryptography, the encryption is done by one
key and the decryption is done by another key .one of this
key is private key and the another key is public key
(known to everyone).
Some of the asymmetric algorithms are RSA, ECC
(Elliptical curve Cryptography), Elgamal. These systems
use two keys, a public key known to everyone and a
private key that only the recipient of messages uses.
Fig 1.2: Asymmetric key cryptography
1.3 Existing work
The SDES key generation is done by using permutation
method. Two keys are generated from the SDES key
generation algorithm .Among them, select the smallest one
as the key.
1.3.1 Encryption Algorithm
Existing Encryption algorithm is done in three steps.caesar
cipher substitution, transposition and arithmetic and
logical operations are applied to generate cipher text. The
three steps are as follows:
Step 1: An automatic key is generated through the
existing SDES key generation algorithm[4]. In the first
round, caesar cipher substitution[5] is performed
with the help of private key produces an intermediate
cipher 1.
Step 2: Apply crossover to the intermediate cipher 1, to
transpose the character’s position, mutation process is
involved. At the end of round 2 an intermediate cipher 2
is produced.
Step 3: Round 3 encompasses all the arithmetic and
logical operations to obtain a final cipher text.
1.3.2 Decryption Algorithm
Decryption algorithm is reverse process of an encryption
algorithm. The three decryption steps are as follows:
Step 1: Take the final cipher text and perform all basic
Arithmetic and logic operations to it. It produces
the intermediate plaintext 1.
Step 2: Apply crossover process to the intermediate
Plaintext1 followed by the mutation technique which gives
the intermediate plaintext2.
Step 3: Finally, reverse caesar cipher substitution is
Involved using private key as declared in the encryption
algorithm.
2. PROPOSED WORK
The proposed algorithm uses seeded sdes key generation,
railference and local binary pattern provides more
complexity for the text. The advantage of high complexity,
the unauthorized person face very difficult to understand
the original plain text.
2.1 SEEDED SDES Key generation
2.1.1 Algorithm steps
Step 1: Initially generate random 64 binary bit sequence.
Step 2: Divide those 64 bits into 8 chunks, each chunk
consists of 8 bits.
Step 3: Retrieve MSB bit from left to right of each chunk,
which results 8 bit sequence.
Step 4: Compute the decimal number to the above 8 bit
Sequence that is referred to be as key.
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975-0290
2696
2.1.2 Flow chart for SEEDED SDES key generation
Fig 2.1: seeded sdes key generation
2.1.3 Example for SEEDED SDES key generation
Step 1: 64 bit sequence is
110101100101010111001100111100000111011
1100100110011101011000110
Step 2: Divide this sequence into 8 chunks:
11010110 | 01010101 | 11001100 | 11110000 |
01110111 | 10010011 | 00111010 | 11000110
Step 3: Retrieve most significant bit from each chunk,
then the production of key in binary is 10110101.
Step 4: The decimal value for the key is 181.
2.2. Encryption Algorithm
By using the key, generated from seeded sdes algorithm
and substitution method an intermediate cipher is
generated. Apply railferance technique on intermediate
cipher and produce intermediate cipher text 2.Combination
of arithmetic and logical operations are applied on
intermediate cipher 2 and produces the final cipher text.
2.2.1 Algorithm steps
Step 1: An intermediate cipher 1 is produced by using
caesar cipher substitution method with the help of private
key [5]. Privates key is obtained from SEEDED SDES
key algorithm.
Step 2: Perform the railference technique for the
Intermediate cipher 1,inverse of text is involved. An
intermediate cipher text 2 is produced.
Step 3: The fina l cipher text is obtained by using local
binary pattern[7]. The process of local binary pattern is to
place the 0th
position bit into 3rd
position bit, the remaining
bits ( previously 1st
, 2nd
and 3rd
position bits) are moved
forward from left to right side. At the final stage, it
encompasses all arithmetic, logical operations and local
binary pattern technique yields final cipher text.
Table: LBP Diagram:
20
27
26
21
25
22
23
24
Conditions:
For i<j: 27
26
25
i>j: 23
22
21
i=j 24
20
after LBP text is: i<j i=j i>j
2.2.2 Flowchart for proposed encryption algorithm
Fig 2.2.1: Encryption algorithm
Table 1: substitution method lookup table
Character Value Characte
r
Value
! 0 R 49
“ 1 S 50
# 2 T 51
$ 3 U 52
% 4 V 53
& 5 W 54
‘ 6 X 55
( 7 Y 56
) 8 Z 57
* 9 [ 58
+ 10  59
‘ 11 ] 60
- 12 ^ 61
. 13 _ 62
start
stop
Generate random 64 bit sequence
Divide 64 bit sequence into 8
chunks
Retrieve MSB bit from each
chunk
Key=MSB bit from each chunk
Start
Stop
Round1:
substitution method
Round2:
Transposition method
Round 3:
local binary pattern
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975-0290
2697
/ 14 ` 63
0 15 a 64
1 16 b 65
2 17 c 66
3 18 d 67
4 19 e 68
5 20 f 69
6 21 g 70
7 22 h 71
8 23 i 72
9 24 j 73
: 25 k 74
; 26 l 75
< 27 m 76
= 28 n 77
> 29 o 78
? 30 p 79
@ 31 q 80
A 32 r 81
B 33 s 82
C 34 t 83
D 35 u 84
E 36 v 85
F 37 w 86
G 38 x 87
H 39 y 88
I 40 z 89
J 41 { 90
K 42 | 91
L 43 } 92
M 44 ~ 93
N 45
O 46
P 47
Q 48
2.2.3 Example for Encryption algorithm
Round 1
Plaintext=computer
key=181
Table 2: Result of Round1
Intermediate cipher1 is hfinm^k
Round 2 Railference
Write intermediate cipher 1 as follows:
 f n ^
h i m k
string1=fn^
string2=himk
string=string1+string2
string=fn^himk
IC2=inverse(string)
Intermediate cipher2(IC2)=kmih^nf
Round 3
Calculate binary equivalent for each character in IC2.
Table 3: Combination of Arithmetic and Logic Operations
Table 4: Local Binary Pattern
Reverse Local
binary
pattern
Equivalent
decimal
value
ASCII
character
01010010 01010001 81 Q
00110010 00110001 49 1
00010010 00010001 17 ◄
11100010 11100001 225 ß
10111100 10110110 182 ╢
10110010 10110001 177 ░
10100010 10100001 161 Í
11011100 11010110 214 ∏
Final cipher text is: Q1◄ß╢░ í∏
2.3 Decryption Algorithm
The process of unlocking encryption information using
cryptography is known as decryption.Local binary
pattern,arithmetic and logical operations ,railference
technique and substitution methods are applied on final
cipher text and produces the original plain text.
2.3.1 Algorithm steps
Step 1: The final cipher text is decrypted by using all
basic arithmetic, logical and Local Binary Pattern
technique to produce the intermediate plaintext1.
The process of Local binary pattern is to place the 3rd
position bit into 0th
position bit and the previously 2nd
, 1st
,0th
bits are moved to 3rd
, 2nd
, 1st
bit positions respectively.
plaintext(p) Corresponding
value(v)
C=(v+key)%94 Corresponding
character of C
c 66 59 
o 78 71 h
m 76 69 f
p 79 72 i
u 84 77 n
t 83 76 m
e 68 61 ^
r 81 74 k
Intermedia
te cipher 2
Corresponding
value
Equivalent
binary
Reverse
k 74 01001010 01010010
m 76 01001100 00110010
i 72 01001000 00010010
h 71 01000111 11100010
^ 61 00111101 10111100
n 77 01001101 10110010
f 69 01000101 10100010
 59 00111011 11011100
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975-0290
2698
Step 2: Apply mutation of the intermediate plaintext1,
railference technique for the plaintext. An intermediate
plaintext 2 is produced.
Step 3: At the end of decryption algorithm,
original plaintext is obtained with the help of all
basic arithmetic, logical operations and Caesar cipher
substitution method.
2.3.2 Flow chart for proposed decryption algorithm
Fig 2.2.1: Decryption algorithm
2.3.3 Example for decryption algorithm:
Round 1:
Cipher text=:Q1◄ß╢░ í∏
Table 5: Inverse Local Binary Pattern
Table 6: Combination of Arithmetic and Logic Operations
Intermediate plaintext1 is kmih^nf
Round 2
I=inv(intermediate plaintext1)
I=fn^himk
Railference
k m i h
^ n f 
string1=hfi
string2= nm^k
string=string1+string2
string=hfinm^k
Intermediate plaintext2 is:hfinm^k
Round 3
if((V+n)>key) then P=((V+n)%key)
else if((V+n+n)>key) then P=((V+n+n)%key)
else P=((V+n+n+n)%key)
Table 7: Reverse Substitution Method
At the end of decryption, original plaintext is: computer
Cipher
text
Equivalent
decimal
value
Equivalent
binary
Local binary
pattern
Q 81 01010001 01010010
1 49 00110001 00110010
◄ 17 00010001 00010010
ß 225 11100001 11100010
╢ 182 10110110 10111100
░ 177 10110001 10110010
Í 161 10100001 10100010
∏ 214 11010110 11011100
Local
binary
pattern
Reverse Correspondi
ng decimal
Value
Correspondin
g character
01010010 01001010 74 k
00110010 01001100 76 m
00010010 01001000 72 i
11100010 01000111 71 h
10111100 00111101 61 ^
10110010 01001101 77 n
10100010 01000101 69 f
11011100 00111011 59 
Intermediat
e plaintext2
Corresponding
numeric value(V)
P=(V+
n)%
key
Equivalent
char
 59 66 c
h 71 78 o
f 69 76 m
i 72 79 p
n 77 84 u
m 76 83 t
^ 61 68 e
k 74 81 r
Start
Stop
Round1:
Inverse Local Binary Pattern
Round2:
Transposition method
Round 3:
Reverse substitution method
Int. J. Advanced Networking and Applications
Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975-0290
2699
3. ADVANTAGES
1. The key is generated through random number
generation with 64 bit sequence.
2. The railference and local binary pattern methods give
complexity to the intermediate cipher text.
3. High processing speed.
4. CONCLUSION
Security plays a vital role in communication channels,
best example is internet. Now-a- days, billions of the
people are using internet. Internet carries a huge amount of
information such as mails, documents, sharing of files,
business deals and so on. In order to protect the
information from unauthorized persons, one needs better
security mechanisms. For protecting information, most
popular approach is cryptography. Cryptography is the art
of secret writing. The main aim of cryptography is to see
that the intended receiver can only understand the
message. The proposed algorithm uses local binary
pattern, railference, substitution method and seeded S-
DES key generation. In the future work, this algorithm
will be extended to use the UNICODE system support.
REFERENCES
[1] Govind Prasad Arya,Aayushi
Nautiyal,ashishPant,Shiv Singh & Tishi Handa,”A cipher
design with automatic key generation using the
combination of substitution and transposition techniques
and basic arithmetic and logic operations,” the SIJ
Transactions on computer science engineering & its
applications
[2] S.G.Srikantaswamy and Dr.H.D.phaneendra,“A cipher
design using the combined effect of arithmetic and
logic operations with substitutions and transposition
techniques , “ International Journal of Computer
Applications(0975-8887),vol.29,no.8,pp.34-36
[3] Jonathan Katz and Yehuda Lindell, Introduction
to modern cryptography, Chapman and hall/CRC,
Taylor and Francis group, 2008.
[4] S.Devi, Dr.V.Palanisamy, ”Multi-Level Encryption
using SDES key generation with Genetic Algorithm”,
international journal of engineering and computer
science (IJECS) , vol.3 , issue.8 , page no: 7596-
7576, aug 2014.
[5] B.Bazith Mohammed, “automatic key generation
of Caesar cipher”, international journal of engineering
trends and technology (IJETT), vol.6,no.6,pp.337-
339,dec.2013.
[6] S.G.Srikantaswamy and
Dr.H.D.Phaneendra,Improved Caesar cipher with
random number Generation technique and multistage
encryption”, International Journal on Cryptography and
information+Security(IJCIS),vol2,no.4,pp.39-49,Dec.2012
[7] Di Huang,Caifeng Shin and Mohsen Ardabilian
“Local Binary Patterns and Its Application to Facial
Image Analysis: survey”, IEEE transactions on
systems, man,and cybernetics_ part c: applications
and reviews, vol.41,no.6,nov 2011.
Authors Profile
Dr.S.Kiran is Assistant
Professor in the department of
Computer Science and
Engineering at Yogivenama
University , Proddatur. He
acquired M.Tech Degree from
Nagarjuna University, Guntur.
He completed Ph.D in computer
science from S.K.University. He has been continuously
imparting his knowledge to several students in research
activities. He published many articles National and
International journals. His research areas are image
Processing, Cryptography and Network Security, Software
Engineering and Data mining and Data ware house.
R. Pradeep Kumar Reddy is
working as Assistant Professor in
Department of CSE at Y.S.R
Engineering College of Yogi
Vemana University, Proddatur.
He received his B.Tech degree in
CSE from Bellary Engineering
College, Bellary (VTU). M. Tech degree in CSE from
S.R.M University, Chennai. He worked as Assistant
Professor and Head of the department CSE, IT and MCA
in Vaagdevi Institute of Technology and Science,
Proddatur during the period 2005 to 2008. Later he joined
as Assistant Professor and Head of the Department IT in
Chaitanya Bharathi Institute of Technology and Science,
Proddatur, during the period 2008 to 2009. He published
many research articles in various National and
International Journals. He attended National and
International Conferences. He is pursuing PhD in digital
image processing at Yogi Vemana University, Kadapa.
J Venkata Sivajaya Sree is a
student in the department of
Computer Science and
Engineering at Y.S.R Engineering
College of Y.V.U, Proddatur .
She is studying 4th
B.Tech in CSE.
She attended many workshops and
Seminars.
D Naga Sravanthi is a student in
the department of Computer
Science and Engineering at Y.S.R
Engineering College of Y.V.U,
Proddatur . She is studying 4th
B.Tech in CSE. She attended
many workshops and Seminars.

More Related Content

What's hot

Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...CAS
 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmeSAT Journals
 
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECCAN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECCijcisjournal
 
Authentication in Different Scenarios
Authentication in Different ScenariosAuthentication in Different Scenarios
Authentication in Different ScenariosRaj Sikarwar
 
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLESPROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLESIJNSA Journal
 
Guillou-quisquater protocol for user authentication based on zero knowledge p...
Guillou-quisquater protocol for user authentication based on zero knowledge p...Guillou-quisquater protocol for user authentication based on zero knowledge p...
Guillou-quisquater protocol for user authentication based on zero knowledge p...TELKOMNIKA JOURNAL
 
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEA PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEijcisjournal
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONraf_slide
 
IRJET- Suspicious Mail Detection
IRJET-  	  Suspicious Mail DetectionIRJET-  	  Suspicious Mail Detection
IRJET- Suspicious Mail DetectionIRJET Journal
 
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...ijwmn
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET Journal
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsTharindu Weerasinghe
 
A performance comparison of proposed approach of multiserver authentication a...
A performance comparison of proposed approach of multiserver authentication a...A performance comparison of proposed approach of multiserver authentication a...
A performance comparison of proposed approach of multiserver authentication a...eSAT Journals
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys IJECEIAES
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
31 Network Security
31 Network Security31 Network Security
31 Network SecurityAhmar Hashmi
 
Computer security module 3
Computer security module 3Computer security module 3
Computer security module 3Deepak John
 

What's hot (20)

Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
G1102014246
G1102014246G1102014246
G1102014246
 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithm
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECCAN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECC
 
Authentication in Different Scenarios
Authentication in Different ScenariosAuthentication in Different Scenarios
Authentication in Different Scenarios
 
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLESPROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
 
Guillou-quisquater protocol for user authentication based on zero knowledge p...
Guillou-quisquater protocol for user authentication based on zero knowledge p...Guillou-quisquater protocol for user authentication based on zero knowledge p...
Guillou-quisquater protocol for user authentication based on zero knowledge p...
 
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEMEA PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
A PAIRING-FREE IDENTITY BASED TRIPARTITE SIGNCRYPTION SCHEME
 
PUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
 
IRJET- Suspicious Mail Detection
IRJET-  	  Suspicious Mail DetectionIRJET-  	  Suspicious Mail Detection
IRJET- Suspicious Mail Detection
 
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
GROUP SESSION KEY EXCHANGE MULTILAYER PERCEPTRON BASED SIMULATED ANNEALING GU...
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DES
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
 
A performance comparison of proposed approach of multiserver authentication a...
A performance comparison of proposed approach of multiserver authentication a...A performance comparison of proposed approach of multiserver authentication a...
A performance comparison of proposed approach of multiserver authentication a...
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
31 Network Security
31 Network Security31 Network Security
31 Network Security
 
Computer security module 3
Computer security module 3Computer security module 3
Computer security module 3
 

Similar to MULTI-STAGE ENCRYPTION USING SEEDED SDES

Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionBRNSSPublicationHubI
 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...IRJET Journal
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database SecurityIRJET Journal
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 

Similar to MULTI-STAGE ENCRYPTION USING SEEDED SDES (20)

Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography Encryption
 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...Text Encryption and Decryption Technique using Columnar Transposition and Sub...
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
 
C0281010016
C0281010016C0281010016
C0281010016
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve CryptographyImplementation Secure Authentication Using Elliptic Curve Cryptography
Implementation Secure Authentication Using Elliptic Curve Cryptography
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

MULTI-STAGE ENCRYPTION USING SEEDED SDES

  • 1. Int. J. Advanced Networking and Applications Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975-0290 2694 MULTI-STAGE ENCRYPTION USING SEEDED SDES Dr.S.Kiran Asst. Prof Department of Computer Science and Engineering, YSREC of Y V University, Proddatur Email: rkirans125@gmail.com R. Pradeep Kumar Reddy Asst. Prof Department of Computer Science and Engineering, YSREC of Y V University, Proddatur Email: pradeepmadhavi@gmail.com J.Venkata Sivajaya Sree Department of Computer Science and Engineering, YSREC of Y V University, Proddatur Email: j.v.s.jayasree@gmail.com D.Naga Sravanthi Department of Computer Science and Engineering, YSREC of Y V University, Proddatur Email: d.nsravanthi2010@gmail.com -------------------------------------------------------------------ABSTRACT-------------------------------------------------------------- Now-a-days the usage of internet increases tremendously so, there is a need of security for the data. Cryptography is a process of scrambling the data into unknown format which provides security to the data. Modern cryptography is mainly based on mathematical theory and computer science practice. Cryptography process is done with the help of encryption and decryption. The basic two ideas behind the cryptography technique are substitution and transposition. This paper presents a multistage encryption algorithm. At the end of each stage an intermediate cipher is produced. The key is generated by using SEEDED SDES algorithm. Final cipher text is derived from the local binary pattern (LBP). Keywords - Decryption, Encryption, Railference, SEEDED SDES key generation, Substitution, Transposition. -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: July 31, 2015 Date of Acceptance: Sep 09, 2015 -------------------------------------------------------------------------------------------------------------------------------------------------- 1. INTRODUCTION Cryptography is the practice and study of techniques for secure communication in the presence of third parties. Cryptography means, a method of transmitting data in sandwiched between a two persons, i.e. those (sender) for whom (receiver) can only read and process the data. A message in its original format, readable by an attacker is plaintext[1] .A message is changed to be unreadable format by sender to anyone except the intended recipient is cipher text. The term is most often associated with encryption and decryption. The scrambling of original text (plain text) into cipher text is known as encryption, and then back again is known as decryption. The main traditional cipher types are transposition ciphers and substitution ciphers. A transposition cipher is one, which rearranges the order of letters in a message. For example ‘computers’ becomes ‘pmocusret’. The cipher, which systematically replaces letters or groups of letters with other letters or group of letters, is referred as substitution cipher. For example: ’talk less work more’ becomes ‘ubml mftt npsf’. An early substitution cipher was the caeser cipher, in which each letter in the plaintext was replaced by a letter with some fixed number of positions further down the alphabet[2]. Application of cryptography includes ATM cards, computer passwords and electronic commerce. In the 20th century, cryptography was predominantly concerned with linguistic (scientific study of language) and lexicographic patterns (greedily generated error- correction codes). Then the emphasis has shifted, and cryptography now makes extensive use of mathematics, including aspects of information theory ( branch of applied mathematics, electrical engineering and computer science), computational complexity(theory of computation), statistics, combinatory(countable discrete structures), abstract algebra, number theory(pure mathematics) and finite mathematics generally[3]. 1.1. Background The word cryptography is derived from the Greek language ‘kryptos’ means “hidden” or “secret”. At 2000bc cryptography was origined with the egyptian practice of hieroglyphics, which consist of complex pictograms. The first known use of a modern cipher was by julius Caesar. Julius Caesar created a system in which each character in his message was replaced by a character three positions ahead of it in the roman alphabet, why because he did not trust his messengers when communicating with his governors and officers. The cryptosystem services are data confidential, data integrity, authentication and non-repudiation. Data
  • 2. Int. J. Advanced Networking and Applications Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975-0290 2695 Confidentiality is a set of rules, which imposes access limits and restrictions on the information. The main aim of Data integrity is to prevent unintentional changes to information and the control of protecting data from unauthorized parties. Authentication performs the conformation of truth attribute of a single piece of data or entity. Now a days cryptography has crooked into a battleground of the world’s best mathematics and computer scientists. The ability to securely store and transfer sensitive information has proved a critical factor in success in war and business[3]. 1.2 Types of cryptography 1.2.1 Symmetric key cryptography In the simpler types of cryptography, the same key is used to encrypt and decrypt the data. Some of the symmetric algorithms are DES, 3DES, AES, IDES, RC4, RC5. Fig 1.1: Symmetric key cryptography. 1.2.2 Asymmetric key cryptography In this type of cryptography, the encryption is done by one key and the decryption is done by another key .one of this key is private key and the another key is public key (known to everyone). Some of the asymmetric algorithms are RSA, ECC (Elliptical curve Cryptography), Elgamal. These systems use two keys, a public key known to everyone and a private key that only the recipient of messages uses. Fig 1.2: Asymmetric key cryptography 1.3 Existing work The SDES key generation is done by using permutation method. Two keys are generated from the SDES key generation algorithm .Among them, select the smallest one as the key. 1.3.1 Encryption Algorithm Existing Encryption algorithm is done in three steps.caesar cipher substitution, transposition and arithmetic and logical operations are applied to generate cipher text. The three steps are as follows: Step 1: An automatic key is generated through the existing SDES key generation algorithm[4]. In the first round, caesar cipher substitution[5] is performed with the help of private key produces an intermediate cipher 1. Step 2: Apply crossover to the intermediate cipher 1, to transpose the character’s position, mutation process is involved. At the end of round 2 an intermediate cipher 2 is produced. Step 3: Round 3 encompasses all the arithmetic and logical operations to obtain a final cipher text. 1.3.2 Decryption Algorithm Decryption algorithm is reverse process of an encryption algorithm. The three decryption steps are as follows: Step 1: Take the final cipher text and perform all basic Arithmetic and logic operations to it. It produces the intermediate plaintext 1. Step 2: Apply crossover process to the intermediate Plaintext1 followed by the mutation technique which gives the intermediate plaintext2. Step 3: Finally, reverse caesar cipher substitution is Involved using private key as declared in the encryption algorithm. 2. PROPOSED WORK The proposed algorithm uses seeded sdes key generation, railference and local binary pattern provides more complexity for the text. The advantage of high complexity, the unauthorized person face very difficult to understand the original plain text. 2.1 SEEDED SDES Key generation 2.1.1 Algorithm steps Step 1: Initially generate random 64 binary bit sequence. Step 2: Divide those 64 bits into 8 chunks, each chunk consists of 8 bits. Step 3: Retrieve MSB bit from left to right of each chunk, which results 8 bit sequence. Step 4: Compute the decimal number to the above 8 bit Sequence that is referred to be as key.
  • 3. Int. J. Advanced Networking and Applications Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975-0290 2696 2.1.2 Flow chart for SEEDED SDES key generation Fig 2.1: seeded sdes key generation 2.1.3 Example for SEEDED SDES key generation Step 1: 64 bit sequence is 110101100101010111001100111100000111011 1100100110011101011000110 Step 2: Divide this sequence into 8 chunks: 11010110 | 01010101 | 11001100 | 11110000 | 01110111 | 10010011 | 00111010 | 11000110 Step 3: Retrieve most significant bit from each chunk, then the production of key in binary is 10110101. Step 4: The decimal value for the key is 181. 2.2. Encryption Algorithm By using the key, generated from seeded sdes algorithm and substitution method an intermediate cipher is generated. Apply railferance technique on intermediate cipher and produce intermediate cipher text 2.Combination of arithmetic and logical operations are applied on intermediate cipher 2 and produces the final cipher text. 2.2.1 Algorithm steps Step 1: An intermediate cipher 1 is produced by using caesar cipher substitution method with the help of private key [5]. Privates key is obtained from SEEDED SDES key algorithm. Step 2: Perform the railference technique for the Intermediate cipher 1,inverse of text is involved. An intermediate cipher text 2 is produced. Step 3: The fina l cipher text is obtained by using local binary pattern[7]. The process of local binary pattern is to place the 0th position bit into 3rd position bit, the remaining bits ( previously 1st , 2nd and 3rd position bits) are moved forward from left to right side. At the final stage, it encompasses all arithmetic, logical operations and local binary pattern technique yields final cipher text. Table: LBP Diagram: 20 27 26 21 25 22 23 24 Conditions: For i<j: 27 26 25 i>j: 23 22 21 i=j 24 20 after LBP text is: i<j i=j i>j 2.2.2 Flowchart for proposed encryption algorithm Fig 2.2.1: Encryption algorithm Table 1: substitution method lookup table Character Value Characte r Value ! 0 R 49 “ 1 S 50 # 2 T 51 $ 3 U 52 % 4 V 53 & 5 W 54 ‘ 6 X 55 ( 7 Y 56 ) 8 Z 57 * 9 [ 58 + 10 59 ‘ 11 ] 60 - 12 ^ 61 . 13 _ 62 start stop Generate random 64 bit sequence Divide 64 bit sequence into 8 chunks Retrieve MSB bit from each chunk Key=MSB bit from each chunk Start Stop Round1: substitution method Round2: Transposition method Round 3: local binary pattern
  • 4. Int. J. Advanced Networking and Applications Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975-0290 2697 / 14 ` 63 0 15 a 64 1 16 b 65 2 17 c 66 3 18 d 67 4 19 e 68 5 20 f 69 6 21 g 70 7 22 h 71 8 23 i 72 9 24 j 73 : 25 k 74 ; 26 l 75 < 27 m 76 = 28 n 77 > 29 o 78 ? 30 p 79 @ 31 q 80 A 32 r 81 B 33 s 82 C 34 t 83 D 35 u 84 E 36 v 85 F 37 w 86 G 38 x 87 H 39 y 88 I 40 z 89 J 41 { 90 K 42 | 91 L 43 } 92 M 44 ~ 93 N 45 O 46 P 47 Q 48 2.2.3 Example for Encryption algorithm Round 1 Plaintext=computer key=181 Table 2: Result of Round1 Intermediate cipher1 is hfinm^k Round 2 Railference Write intermediate cipher 1 as follows: f n ^ h i m k string1=fn^ string2=himk string=string1+string2 string=fn^himk IC2=inverse(string) Intermediate cipher2(IC2)=kmih^nf Round 3 Calculate binary equivalent for each character in IC2. Table 3: Combination of Arithmetic and Logic Operations Table 4: Local Binary Pattern Reverse Local binary pattern Equivalent decimal value ASCII character 01010010 01010001 81 Q 00110010 00110001 49 1 00010010 00010001 17 ◄ 11100010 11100001 225 ß 10111100 10110110 182 ╢ 10110010 10110001 177 ░ 10100010 10100001 161 Í 11011100 11010110 214 ∏ Final cipher text is: Q1◄ß╢░ í∏ 2.3 Decryption Algorithm The process of unlocking encryption information using cryptography is known as decryption.Local binary pattern,arithmetic and logical operations ,railference technique and substitution methods are applied on final cipher text and produces the original plain text. 2.3.1 Algorithm steps Step 1: The final cipher text is decrypted by using all basic arithmetic, logical and Local Binary Pattern technique to produce the intermediate plaintext1. The process of Local binary pattern is to place the 3rd position bit into 0th position bit and the previously 2nd , 1st ,0th bits are moved to 3rd , 2nd , 1st bit positions respectively. plaintext(p) Corresponding value(v) C=(v+key)%94 Corresponding character of C c 66 59 o 78 71 h m 76 69 f p 79 72 i u 84 77 n t 83 76 m e 68 61 ^ r 81 74 k Intermedia te cipher 2 Corresponding value Equivalent binary Reverse k 74 01001010 01010010 m 76 01001100 00110010 i 72 01001000 00010010 h 71 01000111 11100010 ^ 61 00111101 10111100 n 77 01001101 10110010 f 69 01000101 10100010 59 00111011 11011100
  • 5. Int. J. Advanced Networking and Applications Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975-0290 2698 Step 2: Apply mutation of the intermediate plaintext1, railference technique for the plaintext. An intermediate plaintext 2 is produced. Step 3: At the end of decryption algorithm, original plaintext is obtained with the help of all basic arithmetic, logical operations and Caesar cipher substitution method. 2.3.2 Flow chart for proposed decryption algorithm Fig 2.2.1: Decryption algorithm 2.3.3 Example for decryption algorithm: Round 1: Cipher text=:Q1◄ß╢░ í∏ Table 5: Inverse Local Binary Pattern Table 6: Combination of Arithmetic and Logic Operations Intermediate plaintext1 is kmih^nf Round 2 I=inv(intermediate plaintext1) I=fn^himk Railference k m i h ^ n f string1=hfi string2= nm^k string=string1+string2 string=hfinm^k Intermediate plaintext2 is:hfinm^k Round 3 if((V+n)>key) then P=((V+n)%key) else if((V+n+n)>key) then P=((V+n+n)%key) else P=((V+n+n+n)%key) Table 7: Reverse Substitution Method At the end of decryption, original plaintext is: computer Cipher text Equivalent decimal value Equivalent binary Local binary pattern Q 81 01010001 01010010 1 49 00110001 00110010 ◄ 17 00010001 00010010 ß 225 11100001 11100010 ╢ 182 10110110 10111100 ░ 177 10110001 10110010 Í 161 10100001 10100010 ∏ 214 11010110 11011100 Local binary pattern Reverse Correspondi ng decimal Value Correspondin g character 01010010 01001010 74 k 00110010 01001100 76 m 00010010 01001000 72 i 11100010 01000111 71 h 10111100 00111101 61 ^ 10110010 01001101 77 n 10100010 01000101 69 f 11011100 00111011 59 Intermediat e plaintext2 Corresponding numeric value(V) P=(V+ n)% key Equivalent char 59 66 c h 71 78 o f 69 76 m i 72 79 p n 77 84 u m 76 83 t ^ 61 68 e k 74 81 r Start Stop Round1: Inverse Local Binary Pattern Round2: Transposition method Round 3: Reverse substitution method
  • 6. Int. J. Advanced Networking and Applications Volume: 07 Issue: 02 Pages: 2694-2699 (2015) ISSN: 0975-0290 2699 3. ADVANTAGES 1. The key is generated through random number generation with 64 bit sequence. 2. The railference and local binary pattern methods give complexity to the intermediate cipher text. 3. High processing speed. 4. CONCLUSION Security plays a vital role in communication channels, best example is internet. Now-a- days, billions of the people are using internet. Internet carries a huge amount of information such as mails, documents, sharing of files, business deals and so on. In order to protect the information from unauthorized persons, one needs better security mechanisms. For protecting information, most popular approach is cryptography. Cryptography is the art of secret writing. The main aim of cryptography is to see that the intended receiver can only understand the message. The proposed algorithm uses local binary pattern, railference, substitution method and seeded S- DES key generation. In the future work, this algorithm will be extended to use the UNICODE system support. REFERENCES [1] Govind Prasad Arya,Aayushi Nautiyal,ashishPant,Shiv Singh & Tishi Handa,”A cipher design with automatic key generation using the combination of substitution and transposition techniques and basic arithmetic and logic operations,” the SIJ Transactions on computer science engineering & its applications [2] S.G.Srikantaswamy and Dr.H.D.phaneendra,“A cipher design using the combined effect of arithmetic and logic operations with substitutions and transposition techniques , “ International Journal of Computer Applications(0975-8887),vol.29,no.8,pp.34-36 [3] Jonathan Katz and Yehuda Lindell, Introduction to modern cryptography, Chapman and hall/CRC, Taylor and Francis group, 2008. [4] S.Devi, Dr.V.Palanisamy, ”Multi-Level Encryption using SDES key generation with Genetic Algorithm”, international journal of engineering and computer science (IJECS) , vol.3 , issue.8 , page no: 7596- 7576, aug 2014. [5] B.Bazith Mohammed, “automatic key generation of Caesar cipher”, international journal of engineering trends and technology (IJETT), vol.6,no.6,pp.337- 339,dec.2013. [6] S.G.Srikantaswamy and Dr.H.D.Phaneendra,Improved Caesar cipher with random number Generation technique and multistage encryption”, International Journal on Cryptography and information+Security(IJCIS),vol2,no.4,pp.39-49,Dec.2012 [7] Di Huang,Caifeng Shin and Mohsen Ardabilian “Local Binary Patterns and Its Application to Facial Image Analysis: survey”, IEEE transactions on systems, man,and cybernetics_ part c: applications and reviews, vol.41,no.6,nov 2011. Authors Profile Dr.S.Kiran is Assistant Professor in the department of Computer Science and Engineering at Yogivenama University , Proddatur. He acquired M.Tech Degree from Nagarjuna University, Guntur. He completed Ph.D in computer science from S.K.University. He has been continuously imparting his knowledge to several students in research activities. He published many articles National and International journals. His research areas are image Processing, Cryptography and Network Security, Software Engineering and Data mining and Data ware house. R. Pradeep Kumar Reddy is working as Assistant Professor in Department of CSE at Y.S.R Engineering College of Yogi Vemana University, Proddatur. He received his B.Tech degree in CSE from Bellary Engineering College, Bellary (VTU). M. Tech degree in CSE from S.R.M University, Chennai. He worked as Assistant Professor and Head of the department CSE, IT and MCA in Vaagdevi Institute of Technology and Science, Proddatur during the period 2005 to 2008. Later he joined as Assistant Professor and Head of the Department IT in Chaitanya Bharathi Institute of Technology and Science, Proddatur, during the period 2008 to 2009. He published many research articles in various National and International Journals. He attended National and International Conferences. He is pursuing PhD in digital image processing at Yogi Vemana University, Kadapa. J Venkata Sivajaya Sree is a student in the department of Computer Science and Engineering at Y.S.R Engineering College of Y.V.U, Proddatur . She is studying 4th B.Tech in CSE. She attended many workshops and Seminars. D Naga Sravanthi is a student in the department of Computer Science and Engineering at Y.S.R Engineering College of Y.V.U, Proddatur . She is studying 4th B.Tech in CSE. She attended many workshops and Seminars.