Skip to main content

Rotational Cryptographic Technique (RCT)

  • Conference paper
  • First Online:
Intelligent Techniques and Applications in Science and Technology (ICIMSAT 2019)

Part of the book series: Learning and Analytics in Intelligent Systems ((LAIS,volume 12))

  • 852 Accesses

Abstract

A Security scheme based on Block Cipher is being designed where the Encoding and Decoding be prepared using Modular Adding, Rotational Shift operation and binary XNOR operation. The original message is stream of bits, & be presumed to be isolated into an amount of blocks having s bits in each of the them, where s be power of 3 (e.g. 3, 9, 27, 81, 243). An amount of 0’s be added at the MSB location of the stream for constructing whole numeral of bits odd in every block. For getting the cipher text the entire operation is done in two phases. In the first phase modular adding is done on neighboring blocks taking modulus of adding be 2s. The amount restores the subsequent block, 1st block remnants unmoved. At the time of summing up, carry turned beginning the MSB be rejected. In the next phase left and right bit rotation are applied on the output stream and logical XNOR was executed on the result to get the cipher text. The technique be employed on blocks with changeable dimensions from 3 to 3n. For decryption, the order of XNOR operation & rotational shift will be reversed and modular decryption will be adopted.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guha, D., Chakraborty, R., Sinha, A.: A block cipher based cryptosystem through modified forward backward overlapped modulo arithmetic technique (MFBOMAT). Int. Organ. Sci. Res. J. Comput. Eng. (IOSRJCE) 13(1), 138–146 (2013). Article number 22. e-ISSN 2278-0661, p-ISSN 2278-8727

    Google Scholar 

  2. Chakraborty, R., Mandal, J.K.: A microprocessor-based stream cipher through stream parity technique (SPT). In: First International Conference on Computer, Communication, Control and Information Technology (C3IT 2009), 06–07 February 2009, Hoogly, West Bengal, India, Organized and Sponsored by Academy of Technology (AOT), IEEE Leos Calcutta Chapter, IEEE EDS Calcutta Chapter, All India Council for Technical Education (AICTE), Indian Space Research Organization (ISRO), and CSIR. Advanced Research Series, pp 417–423. Macmillan Publishers India Ltd., New Delhi (2009). ISBN 10: 0230-63759-0, ISBN 13: 978-0230-63759-7

    Google Scholar 

  3. Mandal, J.K., Chakraborty, R.: A microprocessor-based block cipher through rotational addition technique (RAT). In: Proceedings of 9th International Conference of IEEE on Information Technology, OTIS, ITER, NJIT SATYAM COMPUTER & IEEE (ICIT 2006), Bhubaneswar, India, 18–21 December 2006, pp. 155–159. IEEE Computer Society Conference Publishing Services (2006). ISBN-10: 0-7695-2635-7/06, ISBN-13: 978-0-7695-2635-5

    Google Scholar 

  4. Mandal, J.K., Sinha, S., Chakraborty, R.: A microprocessor-based block cipher through overlapped modulo arithmetic technique (OMAT). In: Proceedings of 12th International Conference of IEEE on Advanced Computing and Communications ADCOM-2004, 15–18 December, Ahmedabad, India, pp. 276–280 (2004)

    Google Scholar 

  5. Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn. Prentice-Hall of India Private limited, New Delhi (2008)

    Google Scholar 

  6. Kahate, A.: Cryptography and Network Security, 2nd edn. TMH, New Delhi (2008)

    Google Scholar 

  7. Shaify, K., Meenakshi, M.: Performance evaluation of various symmetric encryption algorithms. In: Proceedings of International Conference of IEEE on Parallel, Distributed and Grid Computing, Solan, India, December 2014, pp. 11–13 (2014). https://doi.org/10.1109/pdgc.2014.7030724

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debajyoti Guha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Guha, D., Chakraborty, R., Mandal, J.K. (2020). Rotational Cryptographic Technique (RCT). In: Dawn, S., Balas, V., Esposito, A., Gope, S. (eds) Intelligent Techniques and Applications in Science and Technology. ICIMSAT 2019. Learning and Analytics in Intelligent Systems, vol 12. Springer, Cham. https://doi.org/10.1007/978-3-030-42363-6_18

Download citation

Publish with us

Policies and ethics