SlideShare a Scribd company logo
BYTE ROTATION ENCRYPTION
ALGORITHM
Presented By:-
SHIKHA JAIN
M.Tech (CS)
CONTENTS
Introduction
What is BREA?
BREA Algorithm
Example
BREA with ”Parallel Encryption Model”
Byte Rotation with “CBC Encryption Algorithm”
Advantages
Future Enhancement
Conclusion
References
What is BREA?
Byte Rotation Encryption Algorithm(BREA) (developed in
2012) is a Symmetric key Block Cipher Algorithm which is
applied on different blocks of plaintext and executes in
parallel manner through multithreading concept of single
processor system.
BREA
Symmetric Key Algorithm
Block Cipher Encryption
BYTE ROTATION ENCRYPTION
ALGORITHM
It is a Symmetric Key Block Cipher Algorithm.
Each block size is of 16 bytes.
Byte-Rotation technique is used.
Mono alphabetic substitution concept is followed.
Value of matrix are randomly selected and ranging from 1 to 26.
Size of matrix is 16 bytes.
Example
R A Y M
O N D S
U I T I
N G S 0
M=
18 15 21 14
1 14 9 7
25 4 20 19
13 19 9 0
1 1 1 1
0 1 1 0
1 0 0 1
1 0 0 0
25 15 3 9
20 7 13 8
5 18 22 17
21 12 26 24
18 1 25 13
15 14 4 19
21 9 20 9
14 7 19 0
19 16 22 15
1 15 10 7
26 4 20 20
14 19 9 0
Cpk=K=Mp=
Ke=MpT=
RAYMONDSUITING
S
Ke =Kmod2Transpose matrix
Substitute numeric
values of letters
Cpk=MpT + KeK=Random(1,26,16)
Example
19 16 22 15
1 15 10 7
26 4 20 20
14 19 9 0
Cpk=
16 22 15 19
10 7 1 15
20 26 4 20
14 19 9 0
J Z I S
T S O O
N V A T
P G D 0
10 26 9 19
20 19 15 15
14 22 1 20
16 7 4 0
16 16 22 15
10 15 10 7
20 4 20 20
14 19 9 0
Cvr=Chr=
Ce=Chr=
The cipher texts
block Ce and Key
matrix K sends to
the recipient.
BREA with “Parallel Encryption Model”
Byte Rotation with “CBC Encryption
Algorithm”
Cipher Block Chaining (CBC) uses
feedback to feed the result of
encryption back into the
encryption of next block. The plain
text is XOR’ed with the previous
cipher text block before it is
encrypted. The encryption of each
block depends on all the previous
blocks.
Block
Cipher
Encryption
Block
Cipher
Encryption
Cipher text
Key
Cipher text
Key
PlaintextPlaintext
No complex
calculations
Very fast
Require less
computer
resources
Very secure
Future Enhancement
The system can be easily modified to accept any encryption
algorithm which would be framed in future. Moreover,
currently concentration on the next work which adopts
Parallelism through multiprocessor system where various
encryption algorithms can run in parallel environment
which enhances the performance and speed of
Encryption/Decryption process.
Conclusion
The concept of block wise parallel encryption using
multithreading technique enhances the speed of
encryption system. The system which use “BREA” provides
enough security. Thus the system is justified for its use in
securing files.
References
[1] MAHENDRAN R “BYTE ROTATION WITH CBC ENCRYPTION
ALGORITHM” International Journal of Machine and Construction
Engineering Volume 1 Issue 1 Aug 2014.
[2] Nidhi Gouttam “Implementation Of Simulation Of Byte Rotation
Encryption Algorithm” INTERNATIONAL JOURNAL OF TECHNOLOGY
ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2,
ISSUE 5 ISSN 2347-4289
[3] Sunita Bhatti & Prof. S. K. Sharma, “Block Wise Parallel Encryption
through Multithreading Concept”, Research Paper published in
Aishwarya Research Communication Journal (ISSN: 0975-3613) Vol. 3,
August 2011
[4]W. Stallings, Cryptography and Network Security: Principles and
Practice 3/e. Prentice Hall.
Byte rotation encryption algorithm

More Related Content

What's hot

Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
Adri Jovin
 
Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
Rupesh Mishra
 
Network Security Lec4
Network Security Lec4Network Security Lec4
Network Security Lec4
Federal Urdu University
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
Narrow bicliquesppt
Narrow bicliquespptNarrow bicliquesppt
Narrow bicliquesppt
Rifad Mohamed
 
Comparative analysis on different DES model
Comparative analysis on different DES modelComparative analysis on different DES model
Comparative analysis on different DES model
Saeed Siddik
 
Block Cipher
Block CipherBlock Cipher
Block Cipher
Brandon Byungyong Jo
 
13528 l8
13528 l813528 l8
13528 l8
ridhika_gulati
 
Unit 2
Unit 2Unit 2
Ciphers
CiphersCiphers
Ciphers
phanleson
 
Des lecture
Des lectureDes lecture
Des lecture
ANIKET UTTAM
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
SrideviM4
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
Samy Shehata
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
aritraranjan
 
Minimum parallel binary adders with nor (nand) gates
Minimum parallel binary adders with nor (nand) gatesMinimum parallel binary adders with nor (nand) gates
Minimum parallel binary adders with nor (nand) gates
jpstudcorner
 
cryptography Application of linear algebra
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra
Sami Ullah
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
chauhankapil
 

What's hot (20)

Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Modern symmetric cipher
Modern symmetric cipherModern symmetric cipher
Modern symmetric cipher
 
Network Security Lec4
Network Security Lec4Network Security Lec4
Network Security Lec4
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Narrow bicliquesppt
Narrow bicliquespptNarrow bicliquesppt
Narrow bicliquesppt
 
Comparative analysis on different DES model
Comparative analysis on different DES modelComparative analysis on different DES model
Comparative analysis on different DES model
 
Block Cipher
Block CipherBlock Cipher
Block Cipher
 
13528 l8
13528 l813528 l8
13528 l8
 
Unit 2
Unit 2Unit 2
Unit 2
 
Ciphers
CiphersCiphers
Ciphers
 
Des lecture
Des lectureDes lecture
Des lecture
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
Minimum parallel binary adders with nor (nand) gates
Minimum parallel binary adders with nor (nand) gatesMinimum parallel binary adders with nor (nand) gates
Minimum parallel binary adders with nor (nand) gates
 
cryptography Application of linear algebra
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 

Similar to Byte rotation encryption algorithm

THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
cscpconf
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
Encryption
EncryptionEncryption
Encryption
keith dias
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
Mazin Alwaaly
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
sakhi rehman
 
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
IJNSA Journal
 
cns 2marks
cns 2markscns 2marks
cns 2marks
ilakiyadinesh
 
Cryptography in Blockchain
Cryptography in BlockchainCryptography in Blockchain
Cryptography in Blockchain
EC-Council
 
DEC algorithm
DEC algorithmDEC algorithm
DEC algorithm
vss gowtham
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Haris Ahmed
 
Block Ciphers and DES.pptx
Block Ciphers and DES.pptxBlock Ciphers and DES.pptx
Block Ciphers and DES.pptx
DrAnilKannur1
 
32 9139 it rtl modelling for the cipher blcok ((edit lafi)
32 9139 it   rtl modelling for the cipher blcok ((edit lafi)32 9139 it   rtl modelling for the cipher blcok ((edit lafi)
32 9139 it rtl modelling for the cipher blcok ((edit lafi)
IAESIJEECS
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
SHUBHA CHATURVEDI
 
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionSecured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
Tharindu Weerasinghe
 
Information and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphersInformation and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphers
Vaibhav Khanna
 
Unit 2
Unit  2Unit  2
Unit 2
tamil arasan
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
Deepak John
 
Rass presentation
Rass presentationRass presentation
Rass presentation
Shalini Guha
 

Similar to Byte rotation encryption algorithm (20)

THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Encryption
EncryptionEncryption
Encryption
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Cryptography in Blockchain
Cryptography in BlockchainCryptography in Blockchain
Cryptography in Blockchain
 
DEC algorithm
DEC algorithmDEC algorithm
DEC algorithm
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Block Ciphers and DES.pptx
Block Ciphers and DES.pptxBlock Ciphers and DES.pptx
Block Ciphers and DES.pptx
 
32 9139 it rtl modelling for the cipher blcok ((edit lafi)
32 9139 it   rtl modelling for the cipher blcok ((edit lafi)32 9139 it   rtl modelling for the cipher blcok ((edit lafi)
32 9139 it rtl modelling for the cipher blcok ((edit lafi)
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionSecured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
 
Information and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphersInformation and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphers
 
Unit 2
Unit  2Unit  2
Unit 2
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 
Rass presentation
Rass presentationRass presentation
Rass presentation
 

Recently uploaded

P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
AnasAhmadNoor
 
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Levelised Cost of Hydrogen  (LCOH) Calculator ManualLevelised Cost of Hydrogen  (LCOH) Calculator Manual
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Massimo Talia
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
MadhavJungKarki
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
mahaffeycheryld
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
Kamal Acharya
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Bituminous road construction project based learning report
Bituminous road construction project based learning reportBituminous road construction project based learning report
Bituminous road construction project based learning report
CE19KaushlendraKumar
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
TeluguBadi
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
Seetal Daas
 
Power Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptxPower Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptx
Poornima D
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
ijaia
 

Recently uploaded (20)

P5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civilP5 Working Drawings.pdf floor plan, civil
P5 Working Drawings.pdf floor plan, civil
 
Levelised Cost of Hydrogen (LCOH) Calculator Manual
Levelised Cost of Hydrogen  (LCOH) Calculator ManualLevelised Cost of Hydrogen  (LCOH) Calculator Manual
Levelised Cost of Hydrogen (LCOH) Calculator Manual
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
1FIDIC-CONSTRUCTION-CONTRACT-2ND-ED-2017-RED-BOOK.pdf
 
Generative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdfGenerative AI Use cases applications solutions and implementation.pdf
Generative AI Use cases applications solutions and implementation.pdf
 
Supermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdfSupermarket Management System Project Report.pdf
Supermarket Management System Project Report.pdf
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Bituminous road construction project based learning report
Bituminous road construction project based learning reportBituminous road construction project based learning report
Bituminous road construction project based learning report
 
Unit -II Spectroscopy - EC I B.Tech.pdf
Unit -II Spectroscopy - EC  I B.Tech.pdfUnit -II Spectroscopy - EC  I B.Tech.pdf
Unit -II Spectroscopy - EC I B.Tech.pdf
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
Assistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdfAssistant Engineer (Chemical) Interview Questions.pdf
Assistant Engineer (Chemical) Interview Questions.pdf
 
Power Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptxPower Electronics- AC -AC Converters.pptx
Power Electronics- AC -AC Converters.pptx
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 

Byte rotation encryption algorithm

  • 1. BYTE ROTATION ENCRYPTION ALGORITHM Presented By:- SHIKHA JAIN M.Tech (CS)
  • 2. CONTENTS Introduction What is BREA? BREA Algorithm Example BREA with ”Parallel Encryption Model” Byte Rotation with “CBC Encryption Algorithm” Advantages Future Enhancement Conclusion References
  • 3. What is BREA? Byte Rotation Encryption Algorithm(BREA) (developed in 2012) is a Symmetric key Block Cipher Algorithm which is applied on different blocks of plaintext and executes in parallel manner through multithreading concept of single processor system.
  • 5. BYTE ROTATION ENCRYPTION ALGORITHM It is a Symmetric Key Block Cipher Algorithm. Each block size is of 16 bytes. Byte-Rotation technique is used. Mono alphabetic substitution concept is followed. Value of matrix are randomly selected and ranging from 1 to 26. Size of matrix is 16 bytes.
  • 6. Example R A Y M O N D S U I T I N G S 0 M= 18 15 21 14 1 14 9 7 25 4 20 19 13 19 9 0 1 1 1 1 0 1 1 0 1 0 0 1 1 0 0 0 25 15 3 9 20 7 13 8 5 18 22 17 21 12 26 24 18 1 25 13 15 14 4 19 21 9 20 9 14 7 19 0 19 16 22 15 1 15 10 7 26 4 20 20 14 19 9 0 Cpk=K=Mp= Ke=MpT= RAYMONDSUITING S Ke =Kmod2Transpose matrix Substitute numeric values of letters Cpk=MpT + KeK=Random(1,26,16)
  • 7. Example 19 16 22 15 1 15 10 7 26 4 20 20 14 19 9 0 Cpk= 16 22 15 19 10 7 1 15 20 26 4 20 14 19 9 0 J Z I S T S O O N V A T P G D 0 10 26 9 19 20 19 15 15 14 22 1 20 16 7 4 0 16 16 22 15 10 15 10 7 20 4 20 20 14 19 9 0 Cvr=Chr= Ce=Chr= The cipher texts block Ce and Key matrix K sends to the recipient.
  • 8. BREA with “Parallel Encryption Model”
  • 9. Byte Rotation with “CBC Encryption Algorithm” Cipher Block Chaining (CBC) uses feedback to feed the result of encryption back into the encryption of next block. The plain text is XOR’ed with the previous cipher text block before it is encrypted. The encryption of each block depends on all the previous blocks. Block Cipher Encryption Block Cipher Encryption Cipher text Key Cipher text Key PlaintextPlaintext
  • 10. No complex calculations Very fast Require less computer resources Very secure
  • 11. Future Enhancement The system can be easily modified to accept any encryption algorithm which would be framed in future. Moreover, currently concentration on the next work which adopts Parallelism through multiprocessor system where various encryption algorithms can run in parallel environment which enhances the performance and speed of Encryption/Decryption process.
  • 12. Conclusion The concept of block wise parallel encryption using multithreading technique enhances the speed of encryption system. The system which use “BREA” provides enough security. Thus the system is justified for its use in securing files.
  • 13. References [1] MAHENDRAN R “BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM” International Journal of Machine and Construction Engineering Volume 1 Issue 1 Aug 2014. [2] Nidhi Gouttam “Implementation Of Simulation Of Byte Rotation Encryption Algorithm” INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 5 ISSN 2347-4289 [3] Sunita Bhatti & Prof. S. K. Sharma, “Block Wise Parallel Encryption through Multithreading Concept”, Research Paper published in Aishwarya Research Communication Journal (ISSN: 0975-3613) Vol. 3, August 2011 [4]W. Stallings, Cryptography and Network Security: Principles and Practice 3/e. Prentice Hall.