An Efficient Approach for Increasing Security to Symmetric Data Encryption

被引:0
|
作者
Islam, Muhammad Nazrul [1 ]
Mia, Md. Monir Hossain [2 ]
Islam, Md. Foizul [2 ]
Matin, M. A. [1 ]
机构
[1] Khulna Univ Engn Technol KUET, Dept Comp Sci & Engn, Khulna, Bangladesh
[2] BRAC Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
关键词
Computer Security; Block cipher; plain text; cipher text; Differential cryptanalysis; Linear cryptanalysis; Symmetric Encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithm uniquely defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. Data encryptions standard (DES) use64 bits block size as well as 64 bits key size that are vulnerable to brute-force, attack. But for both efficiency and security a larger block size is desirable. The Advanced Encryption Standard (AES), which use 128 block size as well as 128 bits key size, is using as an encryption standard now. In this paper, we propose an algorithm which is higher secure than Rijndael algorithm but less efficient than that. The difference of efficiency between Rijndael and our propose algorithm is very negligible. We explain all this term in this paper.
引用
收藏
页码:16 / 20
页数:5
相关论文
共 50 条
  • [21] Ciphertext verification security of symmetric encryption schemes
    HU ZhenYuSUN FuChun JIANG JianChun National Laboratory of Information Science and TechnologyDepartment of Computer Science and TechnologyTsinghua UniversityBeijing China Institute of SoftwareChinese Academy of SciencesBeijing China
    Science in China(Series F:Information Sciences), 2009, 52 (09) : 1617 - 1631
  • [22] Ciphertext verification security of symmetric encryption schemes
    HU ZhenYu1
    2 Institute of Software
    Science China(Information Sciences), 2009, (09) : 1617 - 1631
  • [23] Security of Symmetric Encryption against Mass Surveillance
    Bellare, Mihir
    Paterson, Kenneth G.
    Rogaway, Phillip
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 : 1 - 19
  • [24] Automated Security Proof for Symmetric Encryption Modes
    Gagne, Martin
    Lafourcade, Pascal
    Lakhnech, Yassine
    Safavi-Naini, Reihaneh
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2009: INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5913 : 39 - +
  • [25] Computationally Efficient Searchable Symmetric Encryption
    van Liesdonk, Peter
    Sedghi, Saeed
    Doumen, Jeroen
    Hartel, Pieter
    Jonker, Willem
    SECURE DATA MANAGEMENT, 2010, 6358 : 87 - +
  • [26] A Mechanized Proof of Security for Searchable Symmetric Encryption
    Petcher, Adam
    Morrisett, Greg
    2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 481 - 494
  • [27] Ciphertext verification security of symmetric encryption schemes
    ZhenYu Hu
    FuChun Sun
    JianChun Jiang
    Science in China Series F: Information Sciences, 2009, 52 : 1617 - 1631
  • [28] Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation
    Boldyreva, Alexandra
    Degabriele, Jean Paul
    Paterson, Kenneth G.
    Stam, Martijn
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 682 - 699
  • [29] Efficient Joint Encryption and Data Hiding Algorithm for Medical Images Security
    Abdel-Nabi, Hiba
    Al-Haj, Ali
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2017, : 147 - 152
  • [30] Efficient sensitivity orient blockchain encryption for improved data security in cloud
    Siva Kumar, A.
    Godfrey Winster, S.
    Ramesh, R.
    CONCURRENT ENGINEERING-RESEARCH AND APPLICATIONS, 2021, 29 (03): : 249 - 257