International Journal of Computational Intelligence and Information Security, March 2012 Vol. 3, No. 332
Block Based Cryptographic Protocol Depending on G.C.D. for SecuredTransmission
, Sananda Bhattacharyya
, Prof (Dr) Pranam Paul
Student, M. Tech. (CSE), Narula Institute of Technology, Agarpara, West Bengal, INDIAtamisrakundu@gmail.com
Student, M. Tech. (CSE), Narula Institute of Technology, Agarpara, West Bengal, INDIAsanandabhattacharyya@gmail.com
HOD Computer Application, Narula Institute of Technology, Agarpara, West Bengal,INDIApranam.email@example.com
With the growth of internet and network, the need for secure data transmission become more and moreessential and important, as security is a major concern in the internet world. Data likely to be kept hide from allpeople except from the authorized user cannot be sent in plain text. So the plain text should be codified by theprocess of encryption. Each type of data has its own features, therefore different techniques should be used toprotect confidential data from unauthorized access.Here a newly developed encryption technique, named Exponential of 2- XOR-Rail Fence is presented. Thetechnique can be implemented on any kind file as it is implemented in bit-level. The strength of the technique isanalyzed in this synopsis.Using this technique source bit stream is divided, XORed and Rail fenced to get the encrypted text. Thereverse process is applied on the encrypted text to get back the original source bit stream.
Cryptography, Encryption, Decryption, Plain Text, Cipher Text, Network Security
Cryptography is the science of writing messages in secret code and an ancient art; the first documented useof cryptography in writing dates back to circa 1900 B.C.The new forms of cryptography came soon after the widespread development of computer communications.In data and telecommunications, cryptography is necessary when communicating over any untrusted medium,which includes just about any network, particularly the Internet.Here I introduce a block based encryption technique named,
Exponential of 2- XOR-Rail Fence.
Forencryption a key has to be generated. Key length and bit stream is chosen at random. At first plain text isdecomposed into finite number of blocks having same size of random number. G.C.D. and two divisors arecalculated. Each distinct block is divided by divisors alternatively. New blocks are generated and XOR ed withthe random number. The Rail-Fence technique is applied on each distinct resultant block.In decryption process the encrypted text first divided into segments. Getting desirable information from key,reverse process of encryption has been applied on each segment.