Content area
Full text
Abstract- Network security is the primary element to secure a communication network, and if an intruder still able to break this security element, the other and an important element is data encryption which hides the intelligence of data so that other than authorized entities cannot understand the encrypted data. This paper proposed a new shared key, block cipher encryption/decryption algorithm. The algorithm is designed keeping the features of non fiestel cipher and counter mode of block cipher is used in the algorithm. The encryption process starts by entering a key and counter value which is 128bit long. From the 128-bit of key, decimal value is calculated and added between two counter values to make counter value 128-bit. To encrypt data, 128-bit key is used along with counter value. This new algorithm encrypts 128-bit plaintext block and produces 128-bit cipher text block using several encryption elements including matrix transposition, adding average value, key based bitwise transposition operation, and byte substitution. The algorithm is designed for secure communication applications. For the analysis of proposed algorithm different cryptanalysis techniques such as frequency attack, avalanche effect, throughput time and brute force attack are used, and the design is useful in terms of privacy, data confidentiality. The unique combination of encryption elements obscures the relationship between plaintext and cipher text.
Index Terms - Encryption, Decryption, Key, Counter, Symmetric key cryptography, non-fiestel cipher.
(ProQuest: ... denotes formulae omitted.)
I.INTRODUCTION
Data security is considered as a major issue in today's world of communication. Information is considered as an asset between two sharing parities, which requires that their information will be kept unavailable, inaccessible, and strange to rest of the world. Information is transformed from plain text to cipher text and vice versa [1]. This transformation can be done by either of the two ways; symmetric key cryptography or asymmetric key cryptography [2]. For encryption, many symmetric and asymmetric key based, cryptographic algorithms have been designed to provide secure communication such as DES (feistel cipher, symmetric), AES (non-feistel, symmetric) [3], RSA (asymmetric) [4] and ECC (asymmetric) [5]. These algorithms are used to ensure the three distinct goals of security which are confidentiality, integrity, and availability [6]. Cryptographic algorithms are broadly divided into two categories, Symmetric key cryptography and asymmetric key cryptography.
Asymmetric...





