Skip to main content

High Entropy and Avalanche Based Non-Feistel Cascaded CFB Block Cipher Through RSBPNDS and TE

  • Conference paper
  • First Online:
Computational Intelligence, Communications, and Business Analytics (CICBA 2017)

Abstract

Security solutions in today’s data driven solutions have become an inevitable part. Through this privacy, confidentiality and trust can be achieved and this cascaded technique is proposed. Cryptography is most preferred methods to achieve these goals and cryptography is implemented/realized through applied mathematics. Symmetric key cryptography is most efficient method for the security of big data and almost all established symmetric key algorithms; Triple Data Encryption Standard, International Data Encryption Algorithm, Advanced Encryption Standard; are based on Feistel block cipher. This proposed cascaded technique is a non-Fiestel block cipher where plaintext is divided into n number of blocks and each blocks are applied with two encryption functions; Recursive Selected Block Prime-Non-Prime Differential Substitution and Triangular Encryption; in cascaded manner. To achieve good entropy and avalanche; one can apply Cipher Feedback mode to generate final ciphertext by encrypting block by block. This proposed cascaded technique; for its feasibility; is compared with RSA in non-homogeneity, N-gram, floating frequency, avalanche ratio test and entropy test.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. An Approach Towards Development of Efficient Encryption Techniques, Ph.D. (Science) thesis, Department of Computer Science and Applications, University of North Bengal, India (2005)

    Google Scholar 

  2. Authentication of PCSs with Triangular Encryption Technique. In: Proceedings of 6th Philippine Computing Science Congress, PCSC 2006, Ateneo de Manila University, Manila, Philippine, 28–29 March 2006

    Google Scholar 

  3. Mihaljevic, M.J., Imai, H.: A stream cipher design based on embedding of random bits. In: International Symposium on Information Theory and its Applications, ISITA2008, Auckland, New Zealand, 7–10 December 2008. ieeexplore.ieee.org

  4. Garfinkel, S.L.: Public key cryptography, Internet Kiosk, June 1996. ieeexplore.ieee.org

  5. Chakraborty, R., Seth, R., Mandal, J.K.: An FPGA based block cipher through recursive positional substitution on prime-nonprime of cluster (RPSPNC). Published & presented in 3rd international conference on microelectronics, circuits and systems, MICRO 2016, 9–10 July 2016, Science City, Kolkata, West Bengal, India, pp. 96–101. IEEE, CCSN, EDS, Kolkata (2016). ISBN 978-93-80813-45-5. Organized and sponsored by Maulana Abul Kalam Azad University of Technology (MAKAUT) formerly West Bengal University of Technology (WBUT)

    Google Scholar 

  6. Forouzan, B.A.: Cryptography and Network Security, Special Indian Edition 2007. Tata Mc-Graw-Hill. ISBN 13: 978-0-07-066046-5, ISBN 10: 0-07-066046-8

    Google Scholar 

  7. Sarkar, A., Mandal, J.K.: Cryptanalysis of key exchange method in wireless communication (CKE). Int. J. Netw. Secur. (IJNS) (2015). ISSN 1816 – 3548 [Online]; 1816 – 353X [Print]. (Accepted). Indexed by: SCOPUS, DBLP, SCImago, SciVerse, Engineering Village, Ei Compendex, Summon by Serial Solutions, SCImago, EBSCO, DOAJ, Google Scholar etc.

    Google Scholar 

  8. Goswami (Ghosh), J., Paul, M.: A symmetric key cryptographic technique based on frame rotation of an even ordered square matrix. In: Mandal, J.K., Satapathy, S.C., Sanyal, M.K., Sarkar, P.P., Mukhopadhyay, A. (eds.) Information Systems Design and Intelligent Applications. AISC, vol. 339, pp. 319–328. Springer, New Delhi (2015). doi:10.1007/978-81-322-2250-7_31

    Google Scholar 

  9. Chakraborty, R., Mandal, J.K.: Secure encryption technique (SET): a private key crypto system. Int. J. Multidiscipl. Cryptol. Inf. Secur. (IJMCIS) 4(1), 10–13 (2015). ISSN 2320-2610, (January–February 2015 issue)

    Google Scholar 

  10. Sareen, S., Mandal, J.K., Pal, T.: Image encryption using genetic algorithms. In: IEEE Seventh International Joint Conference on Computational Sciences and Optimization, CSO 2014, Beijing, China, 4–6 July 2014 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajdeep Chakraborty .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Chakraborty, R., Seth, R., Mandal, J.K. (2017). High Entropy and Avalanche Based Non-Feistel Cascaded CFB Block Cipher Through RSBPNDS and TE. In: Mandal, J., Dutta, P., Mukhopadhyay, S. (eds) Computational Intelligence, Communications, and Business Analytics. CICBA 2017. Communications in Computer and Information Science, vol 775. Springer, Singapore. https://doi.org/10.1007/978-981-10-6427-2_39

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6427-2_39

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6426-5

  • Online ISBN: 978-981-10-6427-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics