Abstract

Background/objectives: Encryption is one of the most important factors of any security structure. Data cannot be protected without an efficient encryption technique. Different encryption algorithms are available nowadays that apply techniques such as encrypting using symmetric or asymmetric keys, using stream or block ciphers, and others such as Feistel networks, substitution, and permutation, etc. Methods/statistical analysis: We have analysed the existing algorithms so as to get the problem. Findings: The proposed algorithm will solve the problem of maintaining the authenticity of the sender as another third party cannot send a message in the former’s name, as was the problem with earlier algorithms such as DES. Improvements/applications: The main idea of performing this research was to propose an algorithm that can encrypt a message with the sender’s private key and the receiver’s public key together and the same can be decrypted using the receiver’s private key and sender’s public key.Keywords: S-box, P-box, Feistel Networks, DES

Highlights

  • Mobiles are one of the most used devices of the 21st century and are expected to reach 5 billion by 2019

  • Millions and millions of mobile devices are sold in the market

  • We will be encrypting the sender’s message in plain text using two keys – the first key will be the private key of the sender and the second key will be the public key of the receiver

Read more

Summary

Introduction

Mobiles are one of the most used devices of the 21st century and are expected to reach 5 billion by 2019. The Feistel network of DES had only two parts left and right of 32 bit each where the right side was fed into a round function with the key and the result was than xor with the left side and the two parts were swapped. The Round Key Generator will be used to input a different key of the required length to each feistel network. In this algorithm, the plain text is basically divided into two parts encrypted with a key the two parts are again divided into two parts each and so on. The 8 bit blocks will be encrypted twice and joined to form 16

Encryption and Decryption Mechanism
Round Key Generator
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call