Skip to main content

Modified PCT on Variable Cipher Block Chaining Mode

  • Conference paper
  • First Online:
Information Systems Design and Intelligent Applications

Abstract

Permutative Cipher Technique (PCT), a session based symmetric key cryptographic technique was proposed by the authors in February 2008 [1]. In this paper, PCT is implemented on CBC mode of operation with variable block length (VCBC mode) where initialization vector IV is of variable length. The comparative study of the technique PCT with and without VCBC mode has done on twenty files each of four different file types (.dll, .doc, .exe and .txt) with file sizes varying from 1 kB to 6.3 MB (approx.). Results are generated for comparison of PCT with and without VCBC mode with respect to encryption and decryption times, character frequencies, Chi-square values, Avalanche and Strict Avalanche values, Bit Independence values.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Paul, M., Mandal, J.K.: A permutative cipher technique (PCT) to enhance the security of network based transmission. In: 2nd national conference on computing for nation development, New Delhi, India, pp. 197-202, 8–9 Feb 2008

    Google Scholar 

  2. Abiachi, A.M.A., Ahmad, F., Ruhana, K.: A Competitive study of cryptography techniques over block cipher. In: 13th international conference on computer modeling and simulation (UKSim 2011), Cambridge, England, pp. 415–419, 30 Mar–01 April 2011

    Google Scholar 

  3. Navin, A.H., Oskuei, A.R., Khashandarag, A.S., Mirnia, M.: A novel approach cryptography by using residue number system. In: 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2011), Seogwipo, South Korea, pp. 636–639, 29 Nov–01 Dec 2011

    Google Scholar 

  4. Niemiec, M., Machowski, L.: A new symmetric block cipher based on key-dependent S-boxes. In: 4th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2012), St. Petersburg, Russia, pp. 474–478, 3–5 Oct 2012

    Google Scholar 

  5. Bhadra, G., Baia, T., Banik, S., Nath, A., Nath, J.: Bit level encryption standard (BLES): version-II. In: 2nd World Congress on Information and Communacation Technologies (WICT 2012), Trivandrum, Kerala, India, pp. 121–127, 30 Oct –02 Nov 2012

    Google Scholar 

  6. Verma, H.K., Singh, R.K.: Enhancement of RC6 block cipher algorithm and comparison with RC5 & RC6. In: 3rd IEEE international advance computing conference (IACC 2013), Ghaziabad, Uttar Pradesh, India, pp. 556–561, 22–23 Feb 2013

    Google Scholar 

  7. Ramesh, A., Suruliandi, A.: Performance analysis of encryption algorithms for information security. In: International Conference on Circuits, Power and Computing Technologies (ICCPCT 2013), Nagercoil, Tamil Nadu, India, pp. 840–844, 20–21 Mar 2013

    Google Scholar 

  8. Mandal, B.K., Bhattacharyya, D., Bandyopadhyay, S.K.: Designing and performance analysis of a proposed symmetric cryptography algorithm. In: International Conference on Communication Systems and Network Technologies (CSNT 2013), Gwalior, India, pp. 453–461, 6–8 April 2013

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manas Paul .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Paul, M., Mandal, J.K., Singh, M.M. (2015). Modified PCT on Variable Cipher Block Chaining Mode. In: Mandal, J., Satapathy, S., Kumar Sanyal, M., Sarkar, P., Mukhopadhyay, A. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 340. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2247-7_47

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2247-7_47

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2246-0

  • Online ISBN: 978-81-322-2247-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics