Title :
Reverse Circle Cipher for personal and network security
Author :
Isaac, E.R.H.P. ; Isaac, J.H.R. ; Visumathi, J.
Author_Institution :
Jeppiaar Eng. Coll., Chennai, India
Abstract :
Many data encryption techniques have been employed to ensure both personal data security and network security. But few have been successful in merging both under one roof. The block cipher techniques commonly used for personal security such as DES and AES run multiple passes over each block making them ineffective for real time data transfer. Also, ciphers for network security such as Diffie-Hellman and RSA require large number of bits. This paper suggests a simple block cipher scheme to effectively reduce both time and space complexities and still provide adequate security for both security domains. The proposed Reverse Circle Cipher uses `circular substitution´ and `reversal transposition´ to exploit the benefits of both confusion and diffusion. This scheme uses an arbitrarily variable key length which may even be equal to the length of the plaintext or as small as a few bits coupled with an arbitrary reversal factor. This method of encryption can be utilized within stand alone systems for personal data security or even streamed into real time packet transfer for network security. This paper also analyses the effectiveness of the algorithm with respect to the size of the plaintext and frequency distribution within the ciphertext.
Keywords :
computational complexity; computer network security; cryptography; AES; DES; Diffie-Hellman; RSA; block cipher techniques; ciphertext; circular substitution; data encryption techniques; frequency distribution; network security; personal data security; plaintext distribution; real time data transfer; real time packet transfer; reversal transposition; reverse circle cipher; space complexities; time complexities; Ciphers; Communication networks; Encryption; Real-time systems; Standards; Cipher; Cryptography; Frequency Distribution; Network Security;
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2013 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4673-5786-9
DOI :
10.1109/ICICES.2013.6508354