Abstract
Cryptography and cryptanalysis are in ever-lasting struggle. As the encryption techniques advance, the cryptanalysis techniques advance as well. To properly face the great danger of the cryptanalysis techniques, we should diligently look for more effective encryption techniques. These techniques must properly handle any weaknesses that may be exploited by hacking tools. We address this problem by proposing an innovative encryption technique. Our technique has unique features that make it different from the other standard encryption methods. Our method advocates the use of dynamic substitution and tricky manipulation operations that introduce tremendous confusion and diffusion to ciphertext. All this is augmented with an effective key expansion that not only allows for implicit embedment of the key in all of the encryption steps but also produces very different versions of this key. Experiments with our proof-of-concept prototype showed that our method is effective and passes very important security tests.
Highlights
In the digital era, almost all of our sensitive information is either transmitted over the network or digitally stored on machines
This paper proposes an effective encryption technique
Unlike all other encryption techniques, which use a static substitution operation, our technique uses a dynamic substitution operation whose state depends on the key and greatly sensitive to its changes
Summary
Almost all of our sensitive information is either transmitted over the network or digitally stored on machines. Unlike all other encryption techniques (noticeably [3]), which use a static substitution operation, our technique uses a dynamic substitution operation whose state depends on the key and greatly sensitive to its changes. The masking operation uses a novel technique that makes sharp changes to both the individual symbols of the plaintext block and to its structure. It proposes an effective dynamic substitution operation whose functionally highly depends on the key. It proposes a novel key expansion technique.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have