• DocumentCode
    2054693
  • Title

    Reverse Circle Cipher for personal and network security

  • Author

    Isaac, E.R.H.P. ; Isaac, J.H.R. ; Visumathi, J.

  • Author_Institution
    Jeppiaar Eng. Coll., Chennai, India
  • fYear
    2013
  • fDate
    21-22 Feb. 2013
  • Firstpage
    346
  • Lastpage
    351
  • Abstract
    Many data encryption techniques have been employed to ensure both personal data security and network security. But few have been successful in merging both under one roof. The block cipher techniques commonly used for personal security such as DES and AES run multiple passes over each block making them ineffective for real time data transfer. Also, ciphers for network security such as Diffie-Hellman and RSA require large number of bits. This paper suggests a simple block cipher scheme to effectively reduce both time and space complexities and still provide adequate security for both security domains. The proposed Reverse Circle Cipher uses `circular substitution´ and `reversal transposition´ to exploit the benefits of both confusion and diffusion. This scheme uses an arbitrarily variable key length which may even be equal to the length of the plaintext or as small as a few bits coupled with an arbitrary reversal factor. This method of encryption can be utilized within stand alone systems for personal data security or even streamed into real time packet transfer for network security. This paper also analyses the effectiveness of the algorithm with respect to the size of the plaintext and frequency distribution within the ciphertext.
  • Keywords
    computational complexity; computer network security; cryptography; AES; DES; Diffie-Hellman; RSA; block cipher techniques; ciphertext; circular substitution; data encryption techniques; frequency distribution; network security; personal data security; plaintext distribution; real time data transfer; real time packet transfer; reversal transposition; reverse circle cipher; space complexities; time complexities; Ciphers; Communication networks; Encryption; Real-time systems; Standards; Cipher; Cryptography; Frequency Distribution; Network Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Communication and Embedded Systems (ICICES), 2013 International Conference on
  • Conference_Location
    Chennai
  • Print_ISBN
    978-1-4673-5786-9
  • Type

    conf

  • DOI
    10.1109/ICICES.2013.6508354
  • Filename
    6508354