首页    期刊浏览 2024年12月05日 星期四
登录注册

文章基本信息

  • 标题:2-Dimensional Multi Way Feedback Encryption Standard Version-1(2dMWFES-1)
  • 本地全文:下载
  • 作者:Asoke Nath ; Ranjini Mukherjee ; Dona Sarka
  • 期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
  • 印刷版ISSN:2320-9798
  • 电子版ISSN:2320-9801
  • 出版年度:2015
  • 卷号:3
  • 期号:6
  • DOI:10.15680/ijircce.2015.0306011
  • 出版社:S&S Publications
  • 摘要:In the present paper the authors have introduced a new symmetric key cryptographic method which isbased on two dimensional simultaneous feedback method applied along two dimensions i.e. x and y axes on plain text.Nath et al already developed MWFES ver-1,2,3 where they have used encryption methods in one axis i.e. x-axis. Thefeedback was used along x-axis but in forward as well as back directions. In MWFES ver-1 for the first time Nath et alapplied feedback from Left hand side as well as from right hand side along x-axis. Further in ver-2 and ver-3 ofMWFES Nath et al used random feedback, random skip and it makes the whole system quite complex. The standardattack like brute force attack, known plain text attack or differential attack is not possible in MWFES ver-2 and 3.Without knowing the key it almost impossible to break the method. In the present work the authors have introducedmultiway feedback along x-aaxis and y-axis one after the other. The entire content of the file is first converted to a 2dimensional square matrix say nxn where n=number of characters along x-axis and along y-axis. After that there maybe some characters not been accommodated within the largest square matrix and those characters will be kept sepate insome 1-dim array. Feedback applied along x-axis both orward and backward direction. After finishing encryption alongx-axis encryption along y-axis also made. After finishing x-axis and y-axis encryption the residual characters taken onthe front and again repeat the same encryption process. After completion of 2 passes one complete encryption will becompleted. The encryption may be applied multiple times also. Apart from feedback some initial random key is alsorequired for doing the encryption process. The decryption will be the reverse process of encryption. The presentmethod is applied on small text such as password or some confidential key and the results are quite satisfactory. Thepresent method is also free from standard cryptographic attack such as known plain text attack, brute force attack etc.This method applied on various types of files and the results were coming quite satisfactory.
  • 关键词:forward feedback; backward feedback; plain text; cipher text; random key
国家哲学社会科学文献中心版权所有