ABSTRACT
Information security has become an important issue in the modern world as the popularity of internet commerce and communication technologies have emerged, making them a prospective medium to security threats. To surmount these threats, modern data communications uses cryptography - an effective, efficient and essential component for secure transmission of information. To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. This paper presents an innovative symmetric encryption, which we call Scrambled Prime Key Encryption or SPKE that tries to heighten the level of communication security. SPKE has two keys: the first substitutes the bits while the second scrambles them.
- C.H. Meyer (1989). Cryptography ? A State of the Art Review. IEEE-CompEuro '89. 'VLSI and Computer Peripherals. VLSI and Microelectronic Applications in Intelligent Peripherals and their Interconnection Networks, pp. 150--154.Google ScholarCross Ref
- J.L. Massey (1988). An Introduction to Contemporary Cryptology. Proceedings of the IEEE, Special Section on Cryptography, pp. 533--549.Google ScholarCross Ref
- Data Encryption Standard, Federal Information Processing Standard (FIPS) Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington, DC. January 1977.Google Scholar
- B. Schneier (1994). The Blowfish Encryption Algorithm, Dr. Dobb's Journal of Software Tools, 19(4), 98--99.Google Scholar
- AES home page. Retrieved on March 7, 2018 from http://www.nist.gov/ (CryptoToolkit).Google Scholar
- W. Stallings (2011). Cryptography and Network Security: Principles and Practices. Prentice Hall, Saddle River, NY, USA. ISBN 13: 978-0-13-609704-4. Google ScholarDigital Library
- A. Bogdanov, D. Khovratovitch, and C. Rechberger (2011). Biclique Cryptanalysis of the Full AES. In: Lee, D.H. (ed.) ASIACRYPT 2011. LNCS, Springer, Heidelberg, Volume 7073, pp. 344--371.. Google ScholarDigital Library
- F. Patel, and M. Farik (2017). A Novel Recommendation to AES Limitation. International Journal of Scientific & Technology Research Volume 6, Issue 07, ISSN 2277--8616.Google Scholar
- W. Diehl (2017). Attack on AES Implementation Exploiting Publicly-visible Partial Result. Published in IACR Cryptology ePrint Archive.Google Scholar
- R. Gupta (2014). Information Hiding and Attacks: Review. International Journal of Computer Trends and Technology (IJCTT) 10(1): 1--4.Google Scholar
- R. A. Haraty, A. N. Kassar, and S. Fanous (2014). Hardening the El Gamal Public Key Cryptosystem in the Setting of Second Group of Units. International Arab Journal of Information Technology. ISSN: 1683--3198. Volume 11, Number 5.Google Scholar
- R. A. Haraty and W. El Horr (2006). A Hybrid Cryptosystem Based on WEP for 802.11 Networks. Journal of Computational Methods in Sciences and Engineering (JCMSE). ISSN: 1472--7978. Volume 6, Numbers 5,6. Supplement 2. IOS Press. Google ScholarDigital Library
- R. A. Haraty, A. N. El-Kassar, and B. Shebaro (2006). A Comparative Study of El Gamal-based Digital Signature Algorithms. Journal of Computational Methods in Sciences and Engineering (JCMSE). ISSN: 1472--7978. Volume 6, Numbers 5,6. Supplement 1. IOS Press. Google ScholarDigital Library
- R. A. Haraty, A. N. El-Kassar, and B. Shebaro (2006). A Comparative Study of RSA-based Digital Signature Algorithms. Journal of Mathematics and Statistics. ISSN: 1549--3644. Volume 2, Number 1.Google Scholar
- A. N. El-Kassar and R. A. Haraty (2005). El Gamal Public-Key Cryptosystem in Multiplicative Groups of Quotient Rings of Polynomials over Finite Fields. Journal of Computer Science and Information Systems. ISSN: 1820--0214. Volume 2, Number 1.Google Scholar
- B. Alomair, A. Clark, and R. Poovendran (2010). The Power of Primes: Security of Authentication based on a Universal Hash-function Family. Journal of Mathematical Cryptography, Volume 4, Issue 2, pp.121--148, ISSN (Online) 1862--2984.Google Scholar
- D. Selent (2010). Advanced Encryption Standard. Rivier Academic Journal, Volume 6, Number 2, 1--14.Google Scholar
- W. D. Daley and R. G. Kammer (1999). Data Encryption Standard (DES). U.S. Department Of Commerce/National Institute of Standards and Technology, Federal Information Processing Standards Publication.Google Scholar
- P. Rogaway (2011). Evaluation of Some Blockcipher Modes of Operation. University of California, Davis, Dept. of Computer Science, Davis, California, USA. Evaluation carried out for the Cryptography Research and Evaluation Committees (CRYPTREC) for the Government of Japan.Google Scholar
- L. Zhao, A. Adhikari, D. Xiao, and K. Sakurai (2010). Cryptanalysis on an Image Scrambling Encryption Scheme based on Pixel Bit. Proceedings of the International Workshop on Digital Watermarking (IWDW), Lecture Notes in Computer Science, vol 6526. Springer, Berlin, Heidelberg pp. 44--59. 2010. Google ScholarDigital Library
Index Terms
- Scrambled prime key encryption
Recommendations
Public-Key encryption from ID-Based encryption without one-time signature
OTM'06: Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part IDesign a secure public key encryption scheme and its security proof are one of the main interests in cryptography In 2004, Canetti, Halevi and Katz [8] constructed a public key encryption (PKE) from a selective identity-based encryption scheme with a ...
Provably Secure Timed-Release Public Key Encryption
A timed-release cryptosystem allows a sender to encrypt a message so that only the intended recipient can read it only after a specified time. We formalize the concept of a secure timed-release public-key cryptosystem and show that, if a third party is ...
Building Key-Private Public-Key Encryption Schemes
ACISP '09: Proceedings of the 14th Australasian Conference on Information Security and PrivacyIn the setting of identity-based encryption with multiple trusted authorities, TA anonymity formally models the inability of an adversary to distinguish two ciphertexts corresponding to the same message and identity, but generated using different TA ...
Comments