Abstract
Permutative Cipher Technique (PCT), a session based symmetric key cryptographic technique was proposed by the authors in February 2008 [1]. In this paper, PCT is implemented on CBC mode of operation with variable block length (VCBC mode) where initialization vector IV is of variable length. The comparative study of the technique PCT with and without VCBC mode has done on twenty files each of four different file types (.dll, .doc, .exe and .txt) with file sizes varying from 1 kB to 6.3 MB (approx.). Results are generated for comparison of PCT with and without VCBC mode with respect to encryption and decryption times, character frequencies, Chi-square values, Avalanche and Strict Avalanche values, Bit Independence values.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Paul, M., Mandal, J.K.: A permutative cipher technique (PCT) to enhance the security of network based transmission. In: 2nd national conference on computing for nation development, New Delhi, India, pp. 197-202, 8–9 Feb 2008
Abiachi, A.M.A., Ahmad, F., Ruhana, K.: A Competitive study of cryptography techniques over block cipher. In: 13th international conference on computer modeling and simulation (UKSim 2011), Cambridge, England, pp. 415–419, 30 Mar–01 April 2011
Navin, A.H., Oskuei, A.R., Khashandarag, A.S., Mirnia, M.: A novel approach cryptography by using residue number system. In: 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2011), Seogwipo, South Korea, pp. 636–639, 29 Nov–01 Dec 2011
Niemiec, M., Machowski, L.: A new symmetric block cipher based on key-dependent S-boxes. In: 4th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2012), St. Petersburg, Russia, pp. 474–478, 3–5 Oct 2012
Bhadra, G., Baia, T., Banik, S., Nath, A., Nath, J.: Bit level encryption standard (BLES): version-II. In: 2nd World Congress on Information and Communacation Technologies (WICT 2012), Trivandrum, Kerala, India, pp. 121–127, 30 Oct –02 Nov 2012
Verma, H.K., Singh, R.K.: Enhancement of RC6 block cipher algorithm and comparison with RC5 & RC6. In: 3rd IEEE international advance computing conference (IACC 2013), Ghaziabad, Uttar Pradesh, India, pp. 556–561, 22–23 Feb 2013
Ramesh, A., Suruliandi, A.: Performance analysis of encryption algorithms for information security. In: International Conference on Circuits, Power and Computing Technologies (ICCPCT 2013), Nagercoil, Tamil Nadu, India, pp. 840–844, 20–21 Mar 2013
Mandal, B.K., Bhattacharyya, D., Bandyopadhyay, S.K.: Designing and performance analysis of a proposed symmetric cryptography algorithm. In: International Conference on Communication Systems and Network Technologies (CSNT 2013), Gwalior, India, pp. 453–461, 6–8 April 2013
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Paul, M., Mandal, J.K., Singh, M.M. (2015). Modified PCT on Variable Cipher Block Chaining Mode. In: Mandal, J., Satapathy, S., Kumar Sanyal, M., Sarkar, P., Mukhopadhyay, A. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 340. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2247-7_47
Download citation
DOI: https://doi.org/10.1007/978-81-322-2247-7_47
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2246-0
Online ISBN: 978-81-322-2247-7
eBook Packages: EngineeringEngineering (R0)