DocumentCode :
2924447
Title :
Bit Level Encryption Standard (BLES): Version-II
Author :
Bhadra, Gaurav ; Baia, T. ; Banik, Shipra ; Nath, Asoke ; Nath, Jonathan
Author_Institution :
Dept. of Comput. Sci., St. Xavier´s Coll. Autonomous, Kolkata, India
fYear :
2012
fDate :
Oct. 30 2012-Nov. 2 2012
Firstpage :
121
Lastpage :
127
Abstract :
In the present paper the authors have introduced a new symmetric key cryptographic method called Bit Level Encryption Standard(BLES) Version-II which is based on bit exchanging or bit reshuffling method from left to right as well as from right to left of the entire bit stream. In addition to that the authors have used bit-wise XOR operation to make the algorithm more powerful. Recently Nath et al has developed BLES Version-I where they have used bit exchange method but with some fixed block size which were multiple of 2. Due to even power of two sometimes there were some repeat of characters in the encrypted file if the input plain text has also duplicate characters. To overcome this problem in the present work the authors have taken block size of square of off numbers starting from three onwards. For scanning from right to left the authors used square of even numbers starting from four onwards. After finishing bit exchange the authors have performed bit-wise XOR to make the cryptosystem almost unbreakable. The authors have also introduced a special bit manipulation method so the encryption algorithm will work even for all characters with ASCII Code 0 or all characters with ASCII Code 255. The most of the standard encryption algorithm will fail to encrypt a file where all characters are ASCII ´0´ or all characters with ASCII `255´ but the present method will be able to encrypt a file where all characters are ASCII ´0´ or all characters are ASCII `255´. The present method will be effective for encrypting short message, password, confidential key etc. The spectral analysis in the result sections shows that the BLES version-II method is free from known plain text attack, differential attack or any type brute force attack.
Keywords :
cryptography; spectral analysis; telecommunication standards; ASCII ´0´; ASCII Code 0; ASCII Code 255; ASCII `255´; Version-I; bit exchange method; bit level encryption standard; bit-wise XOR operation; confidential key encryption; cryptosystem; differential attack; password encryption; plain text attack; short message encryption; special bit manipulation; spectral analysis; standard encryption algorithm; symmetric key cryptographic method; Communications technology; Decision support systems; ASCII; BLES; XOR; bit exchange; differential attack; random key;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information and Communication Technologies (WICT), 2012 World Congress on
Conference_Location :
Trivandrum
Print_ISBN :
978-1-4673-4806-5
Type :
conf
DOI :
10.1109/WICT.2012.6409061
Filename :
6409061
Link To Document :
بازگشت