Improve the security of CGA using adjustable key block cipher based AES, to prevent attack on AES in IPV6 over MANET

Author(s):  
Kavita T. Patil ◽  
Manoj E. Patil
Keyword(s):  

Information security is an important task on multimedia and communication world. During storing and sharing maintaining a strategic distance from the outsider access of information is the difficult one. There are many encryption algorithms that can provide data security. In this paper two of the encryption algorithms namely AES and RSA are implemented for color images. AES (Advanced Encryption Standard) is a symmetric key block cipher published in December 2001 by NSIT (National Institute of Standards and Technology). RSA (Rivest-Shamir-Adleman) is an asymmetric key block cipher. It uses two separate keys, one for encryption called the public key and other for decryption called the private key. Both the implementation and analysis are done in Matlab. The quality and security level of both the algorithms is analysed based on various criteria such as Histogram analysis, Correlation analysis, Entropy analysis, NPCR (Number of Pixel Change Rate), UACI (Unified Average Changing Intensity), PSNR (Peak Signal-to-Noise Ratio).


2016 ◽  
Vol 66 (6) ◽  
pp. 582 ◽  
Author(s):  
Harish Kumar Sahu ◽  
Vikas Jadhav ◽  
Shefali Sonavane ◽  
R.K. Sharma

International data encryption algorithm (IDEA) is a secret key or symmetric key block cipher. The purpose of IDEA was to replace data encryption standard (DES) cipher, which became practically insecure due to its small key size of 56 bits and increase in computational power of systems. IDEA cipher mainly to provide data confidentiality in variety of applications such as commercial and financial application e.g. pretty good privacy (PGP) protocol. Till 2015, no successful linear or algebraic weaknesses IDEA of have been reported. In this paper, author explained IDEA cipher, its application in PGP and did a systematic survey of various attacks attempted on IDEA cipher. The best cryptanalysis result which applied to all keys could break IDEA up to 6 rounds out of 8.5 rounds of the full IDEA cipher1. But the attack requires 264 known plaintexts and 2126.8 operations for reduced round version. This attack is practically not feasible due to above mention mammoth data and time requirements. So IDEA cipher is still completely secure for practical usage. PGP v2.0 uses IDEA cipher in place of BassOmatic which was found to be insecure for providing data confidentiality.


2012 ◽  
Vol 39 (7) ◽  
pp. 16-18
Author(s):  
Abhijit Chowdhury ◽  
Angshu Kumar Sinha ◽  
Saurabh Dutta
Keyword(s):  

Author(s):  
A. Curiger ◽  
H. Bonnenberg ◽  
R. Zimmermann ◽  
N. Felber ◽  
H. Kaeslin ◽  
...  

2003 ◽  
Vol 86 (2) ◽  
pp. 68-83
Author(s):  
Koichi Matsukawa ◽  
Kunikatsu Kobayashi
Keyword(s):  

1999 ◽  
Vol 18 (2) ◽  
pp. 134-147 ◽  
Author(s):  
Mohammad Peyravian ◽  
Don Coppersmith
Keyword(s):  

Author(s):  
Ashwaq T. Hashim ◽  
Ahmed M. Hasan ◽  
Hayder M. Abbas

This paper attempts to build up a simple, strong and secure cryptographic algorithm. The result of such an attempt is “RC6-Cascade” which is 320-bits RC6 like block cipher. The key can be any length up to 256 bytes. It is a secret-key block cipher with precise characteristics of RC6 algorithm using another overall structure design. In RC6-Cascade, cascading of F-functions will be used instead of rounds. Moreover, the paper investigates a hardware design to efficiently implement the proposed RC6-Cascade block cipher core on field programmable gate array (FPGA). An efficient compact iterative architecture will be designed for the F-function of the above algorithm. The goal is to design a more secure algorithm and present a very fast encryption core for low cost and small size applications.


2019 ◽  
Vol 8 (3) ◽  
pp. 2585-2590

An optimized key scheduling algorithm for the 64-bit block cipher CAST-128 by using dynamically substituting of S-box. In this regard, an attempt has been made to modify key scheduling algorithm for generating subkeys of a secret-key block cipher which is CAST-128 algorithm so as to enhance performance by modifying the generation of subkeys using dynamic substitution of S-box. The CAST-128 uses four static substitution of S-box to generate subkeys, where as the proposed structure generates subkeys using substitution of S-box dynamically to provides the performance of CAST-128. The approach considers different security aspects and metrics evaluation for verification


Author(s):  
Abdessalem Abidi ◽  
Anissa Sghaier ◽  
Mohammed Bakiri ◽  
Christophe Guyeux ◽  
Mohsen Machhout

Sign in / Sign up

Export Citation Format

Share Document