SlideShare a Scribd company logo
1 of 8
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 216
A NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG
SCAN PATTERNS
Kalavathi Alla1
, Sai Jyothi B
1,2
Vasireddy Venkatadri Institute of Technology,
Jawaharlal Nehru Technological University, Kakinada.
Abstract
In today’s world of Information Technology, information storage and distribution is very important. To secure the data in the
network, one need to protect the data using cipher algorithms. This paper presents a novel symmetric block cipher which ciphers
data using zig-zag scan patterns. The input data is divided into manageable size of blocks. Each block of data is taken as an input
and produces the corresponding cipher text. The data is arranged in a corresponding matrix of manageable size using the zig-zag
scan pattern. Then again it is divided into number of 2x2 sub matrices. Cipher text can be retrieved from each 2x2 sub matrix by
reading column wise. The Cipher is tested with time complexity, frequency analysis, and with homogeneity testing.
Keywords: Symmetric Ciphers, block Ciphers, Cryptography, Zig-Zag Scan Patterns, DES
-------------------------------------------------------------------***-------------------------------------------------------------------
1. INTRODUCTION
Cryptography is a science of secret writing which protects
data and transmits secret messages in a distributed network
from one peer to another peer. With the vast development
in the field of information technology, there is a need to
strengthen and develop new security algorithms. Modern
algorithms are based on mathematical theory. These
algorithms are developed by assuming computation
hardness and hard to break practically [4]. Therefore cryptic
ciphers are computationally secure by using integer
factorization. Cryptic ciphers can be developed either by
using symmetric key or asymmetric key cryptography. The
current research focuses on symmetric key cryptography[6].
Symmetric cryptography works with both stream and block
ciphers. A block cipher inputs a block of characters into the
encryption algorithm and outputs a block of cipher
characters. Whereas, stream ciphers encrypts bit by bit
character by characte[7]r. This paper proposes a novel
block cipher algorithms which arranges the letters of the
plain text in Embedded Zerotree Wavelet zig-zag scanning
order (EZWZBS) and then divide the matrix into 2x2 sub
matrices to produce the cipher text. The algorithm is
designed in such a way to overcome with all possible
security attacks in block ciphers. Algorithm illustration and
scanning procedure with an example is explained in
subsequent sections II and III. The experimental results are
discussed in section IV.
2. PROPOSED ALGORITHMS
The proposed algorithm is developed using the principles of
block ciphers. Encryption and decryption algorithms are
described in this section.
2.1 Encryption Algorithm
Step1 : Input a text file as a secret data into the encryption
algorithm.
Step 2: Read the text file and find the relevant ascii value
and convert it to binary and store this string in a variable
secretbin.
Step 3: Divide the secretbin into blocks of manageable size
(2*n)2
, where n=1,2,3,4,… Therefore, the size of each block
becomes 4/16/36/64/100/144………..
Step 4: For each block, do the following steps.
Step 5: Find the size of matrix using the equation 2*n,
where n=1,2,3…so that 2x2,4x4,6x6 matrices can be
generated.
Step 6: The binary bits of each block can be taken from
most significant bit (MSB) to least significant bit (LSB) to
fit in a corresponding matrix by using EZW zig-zag
scanning pattern.
Step 7: Now divide the square matrix of 2*n (where
n=1,2,3…) into (2*x)2
(where x=1/2,1,3/2,2,5/2,…) number
of 2x2 sub matrices. Both n and x are shared between the
sender and receiver.
Step 8: Read bits of each 2x2 sub matrix diagonally and
append to a string cipher.
Step 9: Find the relevant ascii character.
2.2 Decryption Algorithm
Step 1: Input the encrypted file to the decryption algorithm.
Step 2: Read the input file and find the ascii value of each
character, and convert it to binary and also store this binary
stream in a string plainbin.
Step 3: Divide the plainbin string into blocks of manageable
size (2*n)2
, where n is a shared secret key between the tewo
peer entities physically. And n=1,2,3,4,….. So that the size
of each block becomes 4/16/36/64/100/144…
Step 4: For each block of the cipher text Do
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 217
Step 5: Find the size of matrix using 4*n, where n=1,2,3…
so that 2x2,4,x4,6x6,…. matrices can be generated.
Step 6: Find the number of sub matrices using (2*x)2
where
x=1/2,1,3/2,2,5/2…
Step 7: Find the size of square matrix using (2*n)2
where
n=1,2,3,4….. and store in the variable size=m.
Step 8: write bits of the plainbin string diagonally on each
2x2 sub matrix.
Step 9: Combine all the 2x2 sub matrices sequentially to
form a square matrix.
Step 10: Read the bits of the square matrix using EZW zig-
zag scanning pattern and append to a string “retrieved”.
Step 11: Find the relevant ascii characters of string
“retrieved”.
3. IMPLEMENTATION PROCEDURE
To illustrate the (EZWZBS) EZW zig-zag scanning pattern,
let us consider a secret message “CM”. The corresponding 8
bit binary equivalent of ASCII character „c‟ is “01000011”
and for character „M‟ is “01001101”. Therefore the binary
representation of plain text message “CM” is
0100001101001101. Now, divide the binary string into
manageable size of blocks using the formula (2*n)2
Where
n=1,2,3…….. The binary bits of each block are stored in a
square matrix of size 2*n using EZW scanning order.
Fig 1: EZW Zig-Zag Scanning Order
The plain text message is “CM”
Fig 2: Encryption procedure
After arranging bits of plain text in a square matrix divide
them into 2*n number of sub matrices. Read bits of each
2x2 sub matrix diagonally from left to write and top to
bottom. Append all these bits to a cipher string. Find the
relevant ascii character of cipher string to retrieve the cipher
text. As each cryptic algorithm is reversible in nature, apply
vice versa procedure to decrypt the received cipher text.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 218
4. EXPERIMENTAL RESULTS
The EZWZBS algorithm is tested for its efficacy in terms of
encryption and decryption times, frequency analysis,
Avalanche effect which includes both strict avalanche effect
and bit independence criteria. Algorithm is also compared
with the existing algorithms DES with 64 bit and AES with
256 bits.
4.1 Time Complexity Analysis
To find out the efficacy of EZWZBS algorithm time
complexity is calculated based on the time difference
between the processor clock ticks of execution times from
start and end times. We measure the time in terms of
milliseconds. Table 1 shows the time complexity
comparison of proposed algorithm with existing DES and
AES algorithms with variable file sizes [3]. Figure 3 shows
the graphical representation of proposed algorithm
execution times with existing DES and AES algorithms[5].
Table 1: Comparative execution times in milliseconds
S.No Input File Size
(in bytes)
Execution Time in(milliseconds)
DES AES Proposed
Algorithm
1 64 6 12 9
2 128 12 25 16
3 192 19 37 17
4 256 25 50 31
5 1024 100 199 95
6 2048 200 400 190
7 2054 200 400 191
8 5096 497 993 473
9 982732 95750 191500 91171
10 5456704 531661 1063322 506237
Fig 3: Execution times of DES, AES and EZWZBC
4.2 Statistical Analysis
Cryptanalyst benefits from inherent characteristics of plain text language to lodge a statistical attack. The cryptanalyst identifies
the most frequently repeating character in the cipher text, and assumes that the corresponding plain text character is E using the
0
200
400
600
800
1000
1200
64
128
192
256
1024
2048
2054
5096
ExecutionTimeinmilliseconds
Input File Size in Bytes
DES
AES
EZWZBC
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 219
standard frequency of English language. He may also do the same for most frequently repeated diagrams and trigrams in the
cipher text. After finding such a few pairs, the crypt analyst can find the key and use it to decrypt the cipher text. To overcome
with this kind of attacks, the cipher should hide the statistical characteristics of the language. The proposed EZWZBC is tested
with 8 different types of files that we have analyzed in section 4A from such type of attacks. The following figures 4 to 7 shows
the distribution of characters in the source file, and cipher text file according to DES, AES, EZWZBC[5],[7],[11].
Fig 4: Frequency distribution of characters in input file
Fig 5: Frequency Distribution of characters for encrypted file using DES
0
100
200
300
400
500
600
700
800
0 18 36 54 72 90 108 126 144 162 180 198 216 234 252
Frequency
ASCII values of Characters
0
20
40
60
80
100
120
140
0 18 36 54 72 90 108 126 144 162 180 198 216 234 252
Frequency
ASCII Values of Characters
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 220
Fig 6: Frequency distribution of characters for encrypted file using AES
Fig 7: Frequency Distribution of cipher text characters using EZWZBC
4.3 Avalanche Analysis
This is a most desirable property of all cryptographic algorithms and hash functions. Due to this effect when an input changes
slightly, the output changes significantly, that is at least half of the bits will be changed when compared with the original cipher
text. In high quality block ciphers, such a small change in key or plaintext causes a drastic change in the cipher text. Constructing
a cipher to exhibit a substantial avalanche effect is one of the primary design objectives. The proposed EZWZBC algorithm
showed good avalanche effect and is also compared with the existing algorithms DES and AES[5],[7],[11].
Table 2: Comparison of Execution times
S.No Input File Size
(in bytes)
No of bits changed when there is a a bit change in
plain text or key.
DES AES EZWZBC
1 64 43 41 33
2 128 90 83 69
3 192 134 126 93
4 256 185 167 155
5 1024 673 658 642
6 2048 171 1320 1317
7 2054 1380 1318 1326
8 5096 5042 3264 3258
0
10
20
30
40
50
60
70
80
0 18 36 54 72 90 108 126 144 162 180 198 216 234 252
Frequency
ASCII Valeus of Characters
0
10
20
30
40
50
60
0 18 36 54 72 90 108 126 144 162 180 198 216 234 252
Frequency
ASCII Values of Characters
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 221
Fig 8: Graphical representation of execution times
4.4 Non- Homegenity Analysis
In Cryptography, Chi-square analysis is used to examine the homogeneity between the source file and encrypted file(cipher file)
or frequency of each character in source file and encrypted file. This is also known as Pearson‟s test. In this analysis, the
frequency of occurrence of plain text characters in a source file are compared against the frequency of occurrence of these
characters with encrypted file using the following formula.
χ2
= Σ{(fs– fe)2
/fe},
where fs and fe are frequency of each character with respect to the source and encrypted files.
Table 3: Chi square values to test for non homogeneity
.No Input File Size
(in bytes)
Chi-Square Value
DES AES EZWZBC
1 64 953 1113 1021
2 128 1834 2122 1976
3 192 2988 3428 3274
4 256 4213 4385 4289
5 1024 16987 17563 17435
6 2048 34863 35121 35016
7 2054 34934 35153 35097
8 5096 68537 70289 69979
0
256
512
768
1024
1280
1536
1792
2048
2304
2560
2816
3072
3328
3584
3840
4096
4352
4608
4864
64 128 192 256 1024 2048 2054 5096
NoofBitschangedafterencryption
Input File Size in Bytes
EZWZBC
AES
DES
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 222
Fig 9: Graphical representation of chi square test.
5. CONCLUSION
The proposed EZWZBC algorithm is implemented in Java.
The algorithm is very simple and easy to understand. This
algorithm is tested with various performance metrics in
terms of its execution speed, statistical analysis, avalanche
analysis and chi-square analysis. Algorithm ensures high
security in message transmission and is also compatible with
existing industry accepted standards like DES and AES
algorithms.
ACKNOWLEDGMENTS
The authors would like to thank the college management
Vasireddy Venkatadri Institute of Technology for their
academic and financial support to carry out this work.
REFERENCES
[1]. American National Standard for Financial Services
1998, “Triple Data Encryption Algorithm Modes of
Operation.” American Bankers Association, Washington,
D.C. X9.52- July 29, 1998.
[2] Barker W, Recommendation for the Triple Data
Encryption Algorithm (TDEA) Block Cipher, NIST Special
Publication, 2008, 800-67.
[3]. Biham E. and Shamir A., Differential cryptanalysis of
the full 16- round DES, Lecturer Notes in computer Science,
1993, 494-502.
[4]. Douglas R. Stinson, CRYPTOGRAPHY: Theory and
practice, Chapman & Hall/ CRC Press, 2002, pp. 161-280.
[5]. Federal Information Processing Standards Publication
46-3, “Data Encryption Standard (DES).”U.S. DoC/NIST,
October 25,1999..
[6]. Feistel H., Cryptography and Computer Privacy,
Scientific American, vol. 228, no. 5, 1973.
[7]. FIPS PUB 46-3, Federal Information Processing
Standards Publication, 1999.
[8]. Grabbe J., Data Encryption Standard: The DES
algorithm illustrated, Laissez faire City time, vol. 2, no 28,
2003.
[9]. Grinstead Ch. and Snell L., Introduction to Probability,
American Mathematical Society, 1997, pp. 325-360.
[10]. J. Daemen and V. Rijmen, AES Proposal: Rijndael,
AES algorithm Submission, FIPS 197, 1999.
[11]. Jawahar Thakur, Nagesh Kumar, “DES, AES and
Blowfish: Symmetric Key Cryptography algorithms
simulation based performance analysis” International
Journal of Emerging Technology and Advanced
Engineering, Volume 1, Issue 2,December (2011).
[12]. Kalavathi Alla, Gowri Shankar, Secure Transmission
of Authenticated Messages using New Encoding Scheme
and Steganography in CCSEIT 2012 at Coimbatore
Proceedings were published in ACM Digital Library.
[13]. Kalavathi Alla, R. Sivarama Prasad, A New Approach
to Telugu Text Steganography, IEEE ISWTA , Malaysia,
October 2011.
[14]. Kalvathi Alla, Sivarama Prasad Hindi Text
Steganography using Matraye, Core Classification and HHK
Scheme, IEEE ITNG 2010, held at Las Vegas, USA.
[15]. Kalvathi Alla, Sivaram Prasad, Presented a paper on
Evolution of Hindi Text Steganography, IEEE ITNG 2009,
held at Las vegas, USA, April 27-29, 2009.
[16]. Kalavathi Alla, N. Bhagya Sri, An Efficient Key
Exchange for Secure Peer Communications, International
0
10000
20000
30000
40000
50000
60000
70000
64 128 192 256 1024 2048 2054 5096
ChSquareValues
Input File Size in Bytes
DES
AES
EZWZBC
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 223
Journal of Advances in computer, Electrical and Electronics
Engineering, Volume 2 Special Issue, Dec 2012.
[17]. Kalavathi Alla, Sivaram Prasad A New approach to
Hindi Text Steganography using Hindi Karak Kriyaye,
International Journal of Information Assurance and Security,
Vol 6, Issue 6 2011.
[18]. Kalavathi Alla, Sivaram Prasad Information Hiding
using Telugu Text Steganography, International Journal of
Intelligent Information Processing, Volume 6, January 2012.
[19]. Kalavathi Alla, Sivaram Prasad A Novel Hindi Text
Steganography using Letters and Letter Diacritics,
International Journal of Computer Science and Network
Security, Volume 8, issue 12, December 2008
[20]. V.S.Shankar Sriram, Abhishek Kumar Maurya,
G.Sahoo,”A Novel Multiple Key Block Ciphering
Mechanism with Reduced Computational Overhead” in
“International Journal of Computer Applications”, Vol.1
(No.17):25–30, February 2010.

More Related Content

What's hot

Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Information Security Awareness Group
 
Design and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithmDesign and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithmeSAT Publishing House
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersIJNSA Journal
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64 A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64 IJCNCJournal
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture Dhaval Kaneria
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of commonIJNSA Journal
 
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...IJNSA Journal
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images IJECEIAES
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptZiadAlqady
 

What's hot (17)

Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme Jor...
 
Design and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithmDesign and implementation of network security using genetic algorithm
Design and implementation of network security using genetic algorithm
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Parallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errorsParallel generators of pseudo random numbers with control of calculation errors
Parallel generators of pseudo random numbers with control of calculation errors
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64 A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
A SECURITY ANALYSIS OF IOT ENCRYPTION: SIDECHANNEL CUBE ATTACK ON SIMECK32/64
 
Ijnsa050213
Ijnsa050213Ijnsa050213
Ijnsa050213
 
G04433953
G04433953G04433953
G04433953
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
 
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...
SCHEME OF ENCRYPTION FOR BLOCK CIPHERS AND MULTI CODE GENERATION BASED ON SEC...
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
An efficient and highly secure technique to encrypt
An efficient and highly secure technique to encryptAn efficient and highly secure technique to encrypt
An efficient and highly secure technique to encrypt
 

Viewers also liked

Scissors lift and pump assembly
Scissors lift and pump assemblyScissors lift and pump assembly
Scissors lift and pump assemblyJohn Williams
 
Mechanical projects topics in Gagner Technologies
Mechanical projects topics in Gagner TechnologiesMechanical projects topics in Gagner Technologies
Mechanical projects topics in Gagner Technologiesgagnertechnologies
 
Devices operated by hydraulic system in aircraft
Devices operated by hydraulic system in aircraft Devices operated by hydraulic system in aircraft
Devices operated by hydraulic system in aircraft Mal Mai
 

Viewers also liked (6)

Garage equipment ni | Gordon Automotive
Garage equipment ni | Gordon AutomotiveGarage equipment ni | Gordon Automotive
Garage equipment ni | Gordon Automotive
 
Scissors lift and pump assembly
Scissors lift and pump assemblyScissors lift and pump assembly
Scissors lift and pump assembly
 
Letter Formation Phrases, Speech Sound Pics - Alphabetical Order
Letter Formation Phrases, Speech Sound Pics - Alphabetical OrderLetter Formation Phrases, Speech Sound Pics - Alphabetical Order
Letter Formation Phrases, Speech Sound Pics - Alphabetical Order
 
Mechanical projects topics in Gagner Technologies
Mechanical projects topics in Gagner TechnologiesMechanical projects topics in Gagner Technologies
Mechanical projects topics in Gagner Technologies
 
Fabrication of scissor Lift
Fabrication of scissor Lift Fabrication of scissor Lift
Fabrication of scissor Lift
 
Devices operated by hydraulic system in aircraft
Devices operated by hydraulic system in aircraft Devices operated by hydraulic system in aircraft
Devices operated by hydraulic system in aircraft
 

Similar to A new fangled symmetric block cipher using zig-zag scan patterns

Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...eSAT Publishing House
 
Secured key exchange by information reconciliation
Secured key exchange by information reconciliationSecured key exchange by information reconciliation
Secured key exchange by information reconciliationeSAT Publishing House
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
Design of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsDesign of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsAM Publications
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...IJECEIAES
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...eSAT Publishing House
 
Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes     a graph based modified data encryption standard algorithm with enha...Gmdes     a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...eSAT Journals
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET Journal
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESIRJET Journal
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
Efficient document compression using intra frame prediction tecthnique
Efficient document compression using intra frame prediction tecthniqueEfficient document compression using intra frame prediction tecthnique
Efficient document compression using intra frame prediction tecthniqueeSAT Publishing House
 
Noise Driven Encryption Algorithm (NDEA) Version-1
Noise Driven Encryption Algorithm (NDEA) Version-1Noise Driven Encryption Algorithm (NDEA) Version-1
Noise Driven Encryption Algorithm (NDEA) Version-1AM Publications
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmijcsit
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 

Similar to A new fangled symmetric block cipher using zig-zag scan patterns (20)

Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
 
Secured key exchange by information reconciliation
Secured key exchange by information reconciliationSecured key exchange by information reconciliation
Secured key exchange by information reconciliation
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
Design of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic MathematicsDesign of advanced encryption standard using Vedic Mathematics
Design of advanced encryption standard using Vedic Mathematics
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...Gmdes a graph based modified data encryption standard algorithm with enhanced...
Gmdes a graph based modified data encryption standard algorithm with enhanced...
 
Gmdes a graph based modified data encryption standard algorithm with enha...
Gmdes     a graph based modified data encryption standard algorithm with enha...Gmdes     a graph based modified data encryption standard algorithm with enha...
Gmdes a graph based modified data encryption standard algorithm with enha...
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
 
H42054550
H42054550H42054550
H42054550
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Efficient document compression using intra frame prediction tecthnique
Efficient document compression using intra frame prediction tecthniqueEfficient document compression using intra frame prediction tecthnique
Efficient document compression using intra frame prediction tecthnique
 
Noise Driven Encryption Algorithm (NDEA) Version-1
Noise Driven Encryption Algorithm (NDEA) Version-1Noise Driven Encryption Algorithm (NDEA) Version-1
Noise Driven Encryption Algorithm (NDEA) Version-1
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

A new fangled symmetric block cipher using zig-zag scan patterns

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 216 A NEW-FANGLED SYMMETRIC BLOCK CIPHER USING ZIG-ZAG SCAN PATTERNS Kalavathi Alla1 , Sai Jyothi B 1,2 Vasireddy Venkatadri Institute of Technology, Jawaharlal Nehru Technological University, Kakinada. Abstract In today’s world of Information Technology, information storage and distribution is very important. To secure the data in the network, one need to protect the data using cipher algorithms. This paper presents a novel symmetric block cipher which ciphers data using zig-zag scan patterns. The input data is divided into manageable size of blocks. Each block of data is taken as an input and produces the corresponding cipher text. The data is arranged in a corresponding matrix of manageable size using the zig-zag scan pattern. Then again it is divided into number of 2x2 sub matrices. Cipher text can be retrieved from each 2x2 sub matrix by reading column wise. The Cipher is tested with time complexity, frequency analysis, and with homogeneity testing. Keywords: Symmetric Ciphers, block Ciphers, Cryptography, Zig-Zag Scan Patterns, DES -------------------------------------------------------------------***------------------------------------------------------------------- 1. INTRODUCTION Cryptography is a science of secret writing which protects data and transmits secret messages in a distributed network from one peer to another peer. With the vast development in the field of information technology, there is a need to strengthen and develop new security algorithms. Modern algorithms are based on mathematical theory. These algorithms are developed by assuming computation hardness and hard to break practically [4]. Therefore cryptic ciphers are computationally secure by using integer factorization. Cryptic ciphers can be developed either by using symmetric key or asymmetric key cryptography. The current research focuses on symmetric key cryptography[6]. Symmetric cryptography works with both stream and block ciphers. A block cipher inputs a block of characters into the encryption algorithm and outputs a block of cipher characters. Whereas, stream ciphers encrypts bit by bit character by characte[7]r. This paper proposes a novel block cipher algorithms which arranges the letters of the plain text in Embedded Zerotree Wavelet zig-zag scanning order (EZWZBS) and then divide the matrix into 2x2 sub matrices to produce the cipher text. The algorithm is designed in such a way to overcome with all possible security attacks in block ciphers. Algorithm illustration and scanning procedure with an example is explained in subsequent sections II and III. The experimental results are discussed in section IV. 2. PROPOSED ALGORITHMS The proposed algorithm is developed using the principles of block ciphers. Encryption and decryption algorithms are described in this section. 2.1 Encryption Algorithm Step1 : Input a text file as a secret data into the encryption algorithm. Step 2: Read the text file and find the relevant ascii value and convert it to binary and store this string in a variable secretbin. Step 3: Divide the secretbin into blocks of manageable size (2*n)2 , where n=1,2,3,4,… Therefore, the size of each block becomes 4/16/36/64/100/144……….. Step 4: For each block, do the following steps. Step 5: Find the size of matrix using the equation 2*n, where n=1,2,3…so that 2x2,4x4,6x6 matrices can be generated. Step 6: The binary bits of each block can be taken from most significant bit (MSB) to least significant bit (LSB) to fit in a corresponding matrix by using EZW zig-zag scanning pattern. Step 7: Now divide the square matrix of 2*n (where n=1,2,3…) into (2*x)2 (where x=1/2,1,3/2,2,5/2,…) number of 2x2 sub matrices. Both n and x are shared between the sender and receiver. Step 8: Read bits of each 2x2 sub matrix diagonally and append to a string cipher. Step 9: Find the relevant ascii character. 2.2 Decryption Algorithm Step 1: Input the encrypted file to the decryption algorithm. Step 2: Read the input file and find the ascii value of each character, and convert it to binary and also store this binary stream in a string plainbin. Step 3: Divide the plainbin string into blocks of manageable size (2*n)2 , where n is a shared secret key between the tewo peer entities physically. And n=1,2,3,4,….. So that the size of each block becomes 4/16/36/64/100/144… Step 4: For each block of the cipher text Do
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 217 Step 5: Find the size of matrix using 4*n, where n=1,2,3… so that 2x2,4,x4,6x6,…. matrices can be generated. Step 6: Find the number of sub matrices using (2*x)2 where x=1/2,1,3/2,2,5/2… Step 7: Find the size of square matrix using (2*n)2 where n=1,2,3,4….. and store in the variable size=m. Step 8: write bits of the plainbin string diagonally on each 2x2 sub matrix. Step 9: Combine all the 2x2 sub matrices sequentially to form a square matrix. Step 10: Read the bits of the square matrix using EZW zig- zag scanning pattern and append to a string “retrieved”. Step 11: Find the relevant ascii characters of string “retrieved”. 3. IMPLEMENTATION PROCEDURE To illustrate the (EZWZBS) EZW zig-zag scanning pattern, let us consider a secret message “CM”. The corresponding 8 bit binary equivalent of ASCII character „c‟ is “01000011” and for character „M‟ is “01001101”. Therefore the binary representation of plain text message “CM” is 0100001101001101. Now, divide the binary string into manageable size of blocks using the formula (2*n)2 Where n=1,2,3…….. The binary bits of each block are stored in a square matrix of size 2*n using EZW scanning order. Fig 1: EZW Zig-Zag Scanning Order The plain text message is “CM” Fig 2: Encryption procedure After arranging bits of plain text in a square matrix divide them into 2*n number of sub matrices. Read bits of each 2x2 sub matrix diagonally from left to write and top to bottom. Append all these bits to a cipher string. Find the relevant ascii character of cipher string to retrieve the cipher text. As each cryptic algorithm is reversible in nature, apply vice versa procedure to decrypt the received cipher text.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 218 4. EXPERIMENTAL RESULTS The EZWZBS algorithm is tested for its efficacy in terms of encryption and decryption times, frequency analysis, Avalanche effect which includes both strict avalanche effect and bit independence criteria. Algorithm is also compared with the existing algorithms DES with 64 bit and AES with 256 bits. 4.1 Time Complexity Analysis To find out the efficacy of EZWZBS algorithm time complexity is calculated based on the time difference between the processor clock ticks of execution times from start and end times. We measure the time in terms of milliseconds. Table 1 shows the time complexity comparison of proposed algorithm with existing DES and AES algorithms with variable file sizes [3]. Figure 3 shows the graphical representation of proposed algorithm execution times with existing DES and AES algorithms[5]. Table 1: Comparative execution times in milliseconds S.No Input File Size (in bytes) Execution Time in(milliseconds) DES AES Proposed Algorithm 1 64 6 12 9 2 128 12 25 16 3 192 19 37 17 4 256 25 50 31 5 1024 100 199 95 6 2048 200 400 190 7 2054 200 400 191 8 5096 497 993 473 9 982732 95750 191500 91171 10 5456704 531661 1063322 506237 Fig 3: Execution times of DES, AES and EZWZBC 4.2 Statistical Analysis Cryptanalyst benefits from inherent characteristics of plain text language to lodge a statistical attack. The cryptanalyst identifies the most frequently repeating character in the cipher text, and assumes that the corresponding plain text character is E using the 0 200 400 600 800 1000 1200 64 128 192 256 1024 2048 2054 5096 ExecutionTimeinmilliseconds Input File Size in Bytes DES AES EZWZBC
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 219 standard frequency of English language. He may also do the same for most frequently repeated diagrams and trigrams in the cipher text. After finding such a few pairs, the crypt analyst can find the key and use it to decrypt the cipher text. To overcome with this kind of attacks, the cipher should hide the statistical characteristics of the language. The proposed EZWZBC is tested with 8 different types of files that we have analyzed in section 4A from such type of attacks. The following figures 4 to 7 shows the distribution of characters in the source file, and cipher text file according to DES, AES, EZWZBC[5],[7],[11]. Fig 4: Frequency distribution of characters in input file Fig 5: Frequency Distribution of characters for encrypted file using DES 0 100 200 300 400 500 600 700 800 0 18 36 54 72 90 108 126 144 162 180 198 216 234 252 Frequency ASCII values of Characters 0 20 40 60 80 100 120 140 0 18 36 54 72 90 108 126 144 162 180 198 216 234 252 Frequency ASCII Values of Characters
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 220 Fig 6: Frequency distribution of characters for encrypted file using AES Fig 7: Frequency Distribution of cipher text characters using EZWZBC 4.3 Avalanche Analysis This is a most desirable property of all cryptographic algorithms and hash functions. Due to this effect when an input changes slightly, the output changes significantly, that is at least half of the bits will be changed when compared with the original cipher text. In high quality block ciphers, such a small change in key or plaintext causes a drastic change in the cipher text. Constructing a cipher to exhibit a substantial avalanche effect is one of the primary design objectives. The proposed EZWZBC algorithm showed good avalanche effect and is also compared with the existing algorithms DES and AES[5],[7],[11]. Table 2: Comparison of Execution times S.No Input File Size (in bytes) No of bits changed when there is a a bit change in plain text or key. DES AES EZWZBC 1 64 43 41 33 2 128 90 83 69 3 192 134 126 93 4 256 185 167 155 5 1024 673 658 642 6 2048 171 1320 1317 7 2054 1380 1318 1326 8 5096 5042 3264 3258 0 10 20 30 40 50 60 70 80 0 18 36 54 72 90 108 126 144 162 180 198 216 234 252 Frequency ASCII Valeus of Characters 0 10 20 30 40 50 60 0 18 36 54 72 90 108 126 144 162 180 198 216 234 252 Frequency ASCII Values of Characters
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 221 Fig 8: Graphical representation of execution times 4.4 Non- Homegenity Analysis In Cryptography, Chi-square analysis is used to examine the homogeneity between the source file and encrypted file(cipher file) or frequency of each character in source file and encrypted file. This is also known as Pearson‟s test. In this analysis, the frequency of occurrence of plain text characters in a source file are compared against the frequency of occurrence of these characters with encrypted file using the following formula. χ2 = Σ{(fs– fe)2 /fe}, where fs and fe are frequency of each character with respect to the source and encrypted files. Table 3: Chi square values to test for non homogeneity .No Input File Size (in bytes) Chi-Square Value DES AES EZWZBC 1 64 953 1113 1021 2 128 1834 2122 1976 3 192 2988 3428 3274 4 256 4213 4385 4289 5 1024 16987 17563 17435 6 2048 34863 35121 35016 7 2054 34934 35153 35097 8 5096 68537 70289 69979 0 256 512 768 1024 1280 1536 1792 2048 2304 2560 2816 3072 3328 3584 3840 4096 4352 4608 4864 64 128 192 256 1024 2048 2054 5096 NoofBitschangedafterencryption Input File Size in Bytes EZWZBC AES DES
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 222 Fig 9: Graphical representation of chi square test. 5. CONCLUSION The proposed EZWZBC algorithm is implemented in Java. The algorithm is very simple and easy to understand. This algorithm is tested with various performance metrics in terms of its execution speed, statistical analysis, avalanche analysis and chi-square analysis. Algorithm ensures high security in message transmission and is also compatible with existing industry accepted standards like DES and AES algorithms. ACKNOWLEDGMENTS The authors would like to thank the college management Vasireddy Venkatadri Institute of Technology for their academic and financial support to carry out this work. REFERENCES [1]. American National Standard for Financial Services 1998, “Triple Data Encryption Algorithm Modes of Operation.” American Bankers Association, Washington, D.C. X9.52- July 29, 1998. [2] Barker W, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, NIST Special Publication, 2008, 800-67. [3]. Biham E. and Shamir A., Differential cryptanalysis of the full 16- round DES, Lecturer Notes in computer Science, 1993, 494-502. [4]. Douglas R. Stinson, CRYPTOGRAPHY: Theory and practice, Chapman & Hall/ CRC Press, 2002, pp. 161-280. [5]. Federal Information Processing Standards Publication 46-3, “Data Encryption Standard (DES).”U.S. DoC/NIST, October 25,1999.. [6]. Feistel H., Cryptography and Computer Privacy, Scientific American, vol. 228, no. 5, 1973. [7]. FIPS PUB 46-3, Federal Information Processing Standards Publication, 1999. [8]. Grabbe J., Data Encryption Standard: The DES algorithm illustrated, Laissez faire City time, vol. 2, no 28, 2003. [9]. Grinstead Ch. and Snell L., Introduction to Probability, American Mathematical Society, 1997, pp. 325-360. [10]. J. Daemen and V. Rijmen, AES Proposal: Rijndael, AES algorithm Submission, FIPS 197, 1999. [11]. Jawahar Thakur, Nagesh Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography algorithms simulation based performance analysis” International Journal of Emerging Technology and Advanced Engineering, Volume 1, Issue 2,December (2011). [12]. Kalavathi Alla, Gowri Shankar, Secure Transmission of Authenticated Messages using New Encoding Scheme and Steganography in CCSEIT 2012 at Coimbatore Proceedings were published in ACM Digital Library. [13]. Kalavathi Alla, R. Sivarama Prasad, A New Approach to Telugu Text Steganography, IEEE ISWTA , Malaysia, October 2011. [14]. Kalvathi Alla, Sivarama Prasad Hindi Text Steganography using Matraye, Core Classification and HHK Scheme, IEEE ITNG 2010, held at Las Vegas, USA. [15]. Kalvathi Alla, Sivaram Prasad, Presented a paper on Evolution of Hindi Text Steganography, IEEE ITNG 2009, held at Las vegas, USA, April 27-29, 2009. [16]. Kalavathi Alla, N. Bhagya Sri, An Efficient Key Exchange for Secure Peer Communications, International 0 10000 20000 30000 40000 50000 60000 70000 64 128 192 256 1024 2048 2054 5096 ChSquareValues Input File Size in Bytes DES AES EZWZBC
  • 8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 12 | Dec-2014, Available @ http://www.ijret.org 223 Journal of Advances in computer, Electrical and Electronics Engineering, Volume 2 Special Issue, Dec 2012. [17]. Kalavathi Alla, Sivaram Prasad A New approach to Hindi Text Steganography using Hindi Karak Kriyaye, International Journal of Information Assurance and Security, Vol 6, Issue 6 2011. [18]. Kalavathi Alla, Sivaram Prasad Information Hiding using Telugu Text Steganography, International Journal of Intelligent Information Processing, Volume 6, January 2012. [19]. Kalavathi Alla, Sivaram Prasad A Novel Hindi Text Steganography using Letters and Letter Diacritics, International Journal of Computer Science and Network Security, Volume 8, issue 12, December 2008 [20]. V.S.Shankar Sriram, Abhishek Kumar Maurya, G.Sahoo,”A Novel Multiple Key Block Ciphering Mechanism with Reduced Computational Overhead” in “International Journal of Computer Applications”, Vol.1 (No.17):25–30, February 2010.