Full Paper View

Modular Encryption Algorithm for Secure Data Transmission

P.Sri Ram Chandra1 , G. Venkateswara Rao2 , G.V. Swamy3

1 Dept. of CSE, GITAM-Deemed to be University, Visakhapatnam, INDIA.
2 Information Technology Department, GITAM-Deemed to be University, Visakhapatnam, INDIA.
3 Electronics and Physics Department, GITAM-Deemed to be University, Visakhapatnam, INDIA.

Correspondence should be addressed to: psrgietcse@gmail.com.


Section:Research Paper, Product Type: Journal
Vol.6 , Issue.1 , pp.12-22, Feb-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrnsc/v6i1.1222


Online published on Feb 28, 2018


Copyright © P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

Citation :
IEEE Style Citation: P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy, “Modular Encryption Algorithm for Secure Data Transmission”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.12-22, 2018.

MLA Style Citation: P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy "Modular Encryption Algorithm for Secure Data Transmission." International Journal of Scientific Research in Network Security and Communication 6.1 (2018): 12-22.

APA Style Citation: P.Sri Ram Chandra, G. Venkateswara Rao, G.V. Swamy, (2018). Modular Encryption Algorithm for Secure Data Transmission. International Journal of Scientific Research in Network Security and Communication, 6(1), 12-22.

34 Views    38 Downloads    13 Downloads

Abstract :
Information is a strategic resource. Information technology and business transactions are becoming inextricably interwoven, where security for the data and concealed data transmission are made mandatory. Cryptography can be considered as the principle means of providing the data security. In this paper authors have proposed a new symmetric block cipher named Modular Encryption Algorithm with an acronym MEA which uses tri-modular matrix for its key generation, a set of operations on a matrix, Permutations and Substitutions for its encryption and decryption. As part of operations required in MEA authors have proposed M-Box, the functionality is described in this paper. The multilevel cipher rounds used in this algorithm can enhance the security such that even an intruder intercepts the message, it could be difficult to decipher the message. The strength of this algorithm has been analyzed over differential cryptanalysis. This algorithm undoubtedly follows the Strict Plaintext Avalanche Criterion (SPAC) and Strict Key Avalanche Criterion (SKAC) - the Shannon’s property of “Confusion” and “Diffusion”, the results are tabulated in this paper.

Key-Words / Index Term :
Cryptanalysis, Cryptography, Deciphering, Enciphering, Intruder, Tri-modular matrix

References :
[1]. P. Sri Ram Chandra, G.Venkateswara Rao,G.V.Swamy,‘Ultramodern Encryption Standard Cryptosystem using Prolic Series for Secure Data Transmission’, International Journal of Latest Engineering Research and Applications (IJLERA) ISSN: 2455-7137 Volume – 02, Issue – 11, November – 2017, PP – 29-35.
[2]. Zirra Peter Buba & Gregory Maksha Wajiga.: Cryptographic Algorithms for Secure Data Communication. In: International Journal of Computer Science and Security (IJCSS), Volume (5): Issue (2): 2011.
[3]. A.Kahate, cryptography and network security (Third Edition). New Delhi: Tata McGraw Hill.2008.
[4]. Stallings, William, cryptography and network Security (6th edition.). Upper Saddle River, N.J.: Prentic Hall. pp. 67–68.
[5]. Delfs, Hans &Knebl, Helmut (2007). "Symmetric-key encryption". Introduction to cryptography: principles and applications. Springer. ISBN 9783540492436.
[6]. Matt J. B. Robshaw, Stream Ciphers Technical Report TR-701, version 2.0, RSA Laboratories, 1995
[7]. Solomon Kullback, Model Based Interface in the Life Sciences: A Primer on Evidence (New York: Springer 2008-01-01) 51-82.
[8]. Chandrasekaran J. et al. (2011): A Chaos Based Approach for Improving Non Linearity in the S-Box Design of Symmetric Key Cryptosystems in Meghanathan N. et al. Advances in Networks and Communications: First International Conference on Computer Science and Information Technology, CCSIT 2011, Bangalore, India, January2-4, 2011. Proceedings, Part 2. Springer. P.516.
[9]. Norman D. Jorstad.: Cryptographic Algorithm Metrics, January 1997.
[10]. Michael sipser, Introduction to the theory of Computation (Second Edition).

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  editor@isroset.org or view contact page for more details.

Go to Navigation