Abstract
Security solutions in today’s data driven solutions have become an inevitable part. Through this privacy, confidentiality and trust can be achieved and this cascaded technique is proposed. Cryptography is most preferred methods to achieve these goals and cryptography is implemented/realized through applied mathematics. Symmetric key cryptography is most efficient method for the security of big data and almost all established symmetric key algorithms; Triple Data Encryption Standard, International Data Encryption Algorithm, Advanced Encryption Standard; are based on Feistel block cipher. This proposed cascaded technique is a non-Fiestel block cipher where plaintext is divided into n number of blocks and each blocks are applied with two encryption functions; Recursive Selected Block Prime-Non-Prime Differential Substitution and Triangular Encryption; in cascaded manner. To achieve good entropy and avalanche; one can apply Cipher Feedback mode to generate final ciphertext by encrypting block by block. This proposed cascaded technique; for its feasibility; is compared with RSA in non-homogeneity, N-gram, floating frequency, avalanche ratio test and entropy test.
References
An Approach Towards Development of Efficient Encryption Techniques, Ph.D. (Science) thesis, Department of Computer Science and Applications, University of North Bengal, India (2005)
Authentication of PCSs with Triangular Encryption Technique. In: Proceedings of 6th Philippine Computing Science Congress, PCSC 2006, Ateneo de Manila University, Manila, Philippine, 28–29 March 2006
Mihaljevic, M.J., Imai, H.: A stream cipher design based on embedding of random bits. In: International Symposium on Information Theory and its Applications, ISITA2008, Auckland, New Zealand, 7–10 December 2008. ieeexplore.ieee.org
Garfinkel, S.L.: Public key cryptography, Internet Kiosk, June 1996. ieeexplore.ieee.org
Chakraborty, R., Seth, R., Mandal, J.K.: An FPGA based block cipher through recursive positional substitution on prime-nonprime of cluster (RPSPNC). Published & presented in 3rd international conference on microelectronics, circuits and systems, MICRO 2016, 9–10 July 2016, Science City, Kolkata, West Bengal, India, pp. 96–101. IEEE, CCSN, EDS, Kolkata (2016). ISBN 978-93-80813-45-5. Organized and sponsored by Maulana Abul Kalam Azad University of Technology (MAKAUT) formerly West Bengal University of Technology (WBUT)
Forouzan, B.A.: Cryptography and Network Security, Special Indian Edition 2007. Tata Mc-Graw-Hill. ISBN 13: 978-0-07-066046-5, ISBN 10: 0-07-066046-8
Sarkar, A., Mandal, J.K.: Cryptanalysis of key exchange method in wireless communication (CKE). Int. J. Netw. Secur. (IJNS) (2015). ISSN 1816 – 3548 [Online]; 1816 – 353X [Print]. (Accepted). Indexed by: SCOPUS, DBLP, SCImago, SciVerse, Engineering Village, Ei Compendex, Summon by Serial Solutions, SCImago, EBSCO, DOAJ, Google Scholar etc.
Goswami (Ghosh), J., Paul, M.: A symmetric key cryptographic technique based on frame rotation of an even ordered square matrix. In: Mandal, J.K., Satapathy, S.C., Sanyal, M.K., Sarkar, P.P., Mukhopadhyay, A. (eds.) Information Systems Design and Intelligent Applications. AISC, vol. 339, pp. 319–328. Springer, New Delhi (2015). doi:10.1007/978-81-322-2250-7_31
Chakraborty, R., Mandal, J.K.: Secure encryption technique (SET): a private key crypto system. Int. J. Multidiscipl. Cryptol. Inf. Secur. (IJMCIS) 4(1), 10–13 (2015). ISSN 2320-2610, (January–February 2015 issue)
Sareen, S., Mandal, J.K., Pal, T.: Image encryption using genetic algorithms. In: IEEE Seventh International Joint Conference on Computational Sciences and Optimization, CSO 2014, Beijing, China, 4–6 July 2014 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chakraborty, R., Seth, R., Mandal, J.K. (2017). High Entropy and Avalanche Based Non-Feistel Cascaded CFB Block Cipher Through RSBPNDS and TE. In: Mandal, J., Dutta, P., Mukhopadhyay, S. (eds) Computational Intelligence, Communications, and Business Analytics. CICBA 2017. Communications in Computer and Information Science, vol 775. Springer, Singapore. https://doi.org/10.1007/978-981-10-6427-2_39
Download citation
DOI: https://doi.org/10.1007/978-981-10-6427-2_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6426-5
Online ISBN: 978-981-10-6427-2
eBook Packages: Computer ScienceComputer Science (R0)