A Novel Block Cipher Based on Randomly Shuffled Key Strings

  • PDF / 1,469,879 Bytes
  • 13 Pages / 595.276 x 790.866 pts Page_size
  • 37 Downloads / 196 Views

DOWNLOAD

REPORT


RESEARCH ARTICLE-COMPUTER ENGINEERING AND COMPUTER SCIENCE

A Novel Block Cipher Based on Randomly Shuffled Key Strings Muhammad Sadrul Muttaquin Hoque Najat1

· Ahmed Imteaj2 · Md. Kamrul Hossain3

Received: 22 August 2019 / Accepted: 29 August 2020 © King Fahd University of Petroleum & Minerals 2020

Abstract Information security has immense importance in today’s world of digital communication. Sharing information between intended parties while keeping it secret from any outsider is a challenging task. Cryptography provides the security of information by keeping the information secret among only the communicating parties. In this paper, a new cryptographic algorithm is propounded, which is a block cipher algorithm. A positive integer, n, two n × 256 tables of ASCII characters, and a string, Mapper , are used as shared private keys in the proposed method. Every row of the key tables and Mapper contains a random permutation of all the ASCII characters. In the beginning of encryption of a block, an Exclusive Or (XOR) operation is done between the block and a random array of integers. Then, a 3-round substitution operation is done using the key tables and Mapper . We found that the encryption and the decryption speed of the proposed algorithm is faster than the encryption–decryption speed of Advanced Encryption Standard (AES) and Data Encryption Standard (DES). The strength of the proposed cipher was analyzed in the light of some popular attacks, and we found that the system is strong enough against those attacks. We hope that if integrated with the modern cryptography protocols, this method will enhance modern digital communication security. Keywords Block cipher · Shuffle · Exclusive or · Substitution · Encryption · Decryption

1 Introduction Cryptography is the method of changing the original readable and understandable data into another form so that nobody other than the ones to whom it has been sent can understand its meaning. As interchange of information through digital media needs very high-level security, cryptography is used to provide the security to the information. Modern cryptographic algorithms are basically designed based on

B

Muhammad Sadrul Muttaquin Hoque Najat [email protected] Ahmed Imteaj [email protected] Md. Kamrul Hossain [email protected]

1

Department of Computer Science and Engineering (CSE), International Islamic University Chittagong (IIUC), Kumira 4318, Bangladesh

2

School of Computing and Information Sciences, Florida International University, Miami, FL 33199, USA

3

Institute of Information and Communication Technology, Chittagong University of Engineering and Technology, Chittagong 4349, Bangladesh

mathematical theory and computer science practice, with a view to make the security provided by them as high as possible. However, the problems that cryptography deals with can be divided into four areas [1], i.e., confidentiality, authenticity, nonrepudiation, and integrity. Confidentiality means that only authorized people have access to the information. Authenti