Abstract

In this paper a session based symmetric key cryptographic algorithm has been proposed and it is termed as Matrix Based Bit Jumbling Technique (MBBJT). MBBJT consider the plain text (i.e. the input file) as a binary bit stream with finite number bits. This input bit stream is divided into manageable-sized blocks with different length. The bits of the each block fit diagonally upward starting from ( n , n ) cell in a right to left trajectory into a square matrix of suitable order n. Then the bits are taken from the square matrix columnwise from top to bottom to form the encrypted binary string and from this encrypted string cipher text is formed. Combination of the values of block length and the no. of blocks of a session generates the session key. For decryption the cipher text is considered as a stream of binary bits. After processing the session key information, this binary string is divided into blocks. The bits of the each block fit column-wise from top to bottom into a square matrix of order n. Now bits are taken diagonally upward starting from ( n , n ) cell in a right to left trajectory from the square matrix to form the decrypted binary string. Plain text is regenerated from this binary string. Comparison of MBBJT with existing and industrially accepted TDES and AES has been done.

Highlights

  • Day by day our communication becomes faster and simpler for internet

  • Based on symmetric key cryptography a new technique has been proposed where the plain text is considered as a stream of binary bits

  • The comparative study between Triple-DES (168bits), AES (128bits) and Matrix Based Bit Jumbling Technique (MBBJT) has done on 20 files of 8 different types with file sizes varying from 330 bytes to 62657918 bytes (59.7 MB)

Read more

Summary

INTRODUCTION

Day by day our communication becomes faster and simpler for internet. Every computer is connected virtually to each other through internet. Securing electronic data is gradually becoming important with the increasing dependency on the data interchange by the internet. Network security is the most focused topic among the researchers [1, 2, 3, 4]. As a result continuous research works are going on in this field of cryptography to enhance the network security. Based on symmetric key cryptography a new technique has been proposed where the plain text is considered as a stream of binary bits. A session key is generated using plain text information. The plain text can be regenerated from the cipher text using the session key information.

Encryption Algorithm
Decryption Algorithm
Generation of Session Key
EXAMPLE
RESULTS AND ANALYSIS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call