Abstract

Cryptography and cryptanalysis are in ever-lasting struggle. As the encryption techniques advance, the cryptanalysis techniques advance as well. To properly face the great danger of the cryptanalysis techniques, we should diligently look for more effective encryption techniques. These techniques must properly handle any weaknesses that may be exploited by hacking tools. We address this problem by proposing an innovative encryption technique. Our technique has unique features that make it different from the other standard encryption methods. Our method advocates the use of dynamic substitution and tricky manipulation operations that introduce tremendous confusion and diffusion to ciphertext. All this is augmented with an effective key expansion that not only allows for implicit embedment of the key in all of the encryption steps but also produces very different versions of this key. Experiments with our proof-of-concept prototype showed that our method is effective and passes very important security tests.

Highlights

  • In the digital era, almost all of our sensitive information is either transmitted over the network or digitally stored on machines

  • This paper proposes an effective encryption technique

  • Unlike all other encryption techniques, which use a static substitution operation, our technique uses a dynamic substitution operation whose state depends on the key and greatly sensitive to its changes

Read more

Summary

INTRODUCTION

Almost all of our sensitive information is either transmitted over the network or digitally stored on machines. Unlike all other encryption techniques (noticeably [3]), which use a static substitution operation, our technique uses a dynamic substitution operation whose state depends on the key and greatly sensitive to its changes. The masking operation uses a novel technique that makes sharp changes to both the individual symbols of the plaintext block and to its structure. It proposes an effective dynamic substitution operation whose functionally highly depends on the key. It proposes a novel key expansion technique.

DYNAMIC BOX SUBSTITUTION
KEY EXPANSION
DIFFUSE AND INVERSE DIFFUSE OPERATIONS
The Mesh
Mesh-Based Mapping
MASK PROCESS
THE CIPHER TECHNIQUE
The Decryption Process
VIII. RELATED WORK
PERFORMANCE ANALYSIS
Encryption Example
Analytical Performance Evaluation
Empirical Evaluation
CONCLUSIONS AND FUTURE WORK
Findings
Key-Based Numbers
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call