Abstract
Cryptography is the process of turning something readable into something unreadable. Nowadays, internet is being used by the people for exchanging information electronically. The rapid growth of internet increased the number of electronic transactions made by internet users. The information traveled over the internet is very much confidential which need to be secured from unauthorized access, resulted the need of cryptography. In this paper, an innovative technique has been proposed where the three symmetric keys were generated through a randomization process and used for encryption and decryption. Combination of three random keys was used in the encryption process which makes this technique unbreakable and secured against brute force attack and other similar attacks. This technique generates different-different ciphertext each time for the same message which also ensures the protection against various cryptanalytic attacks. This technique can be used to encrypt and decrypt the alphanumeric data in milliseconds which makes the technique more efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Johari, R., Bhatia, H., Singh, S., Chauhan, M.: Triplicative cipher technique. In: International Conference on Information Security and Privacy, pp. 217–223. Elsevier, New Delhi (2015)
Kamalakannan, V., Tamilselvan, S.: Security enhancement of text message based on matrix approach using elliptical curve cryptosystem. In: 2nd International Conference on Nanomaterials and Technologies (CNT), pp. 489–496. ELSEVIER (2015)
Singh, L., Singh, K.: Implementation of text encryption using elliptic curve cryptography. In: Eleventh International Multi-Conference on Information Processing, pp. 73–82. Elsevier (2015)
Paira, S., Chandra, S., Safikul Alam, S., Bhattacharyya, S.: Symmetric key encryption through data structure and binary-gray conversion. In: Shetty, N.R., Prasad, N.H., Nalini, N. (eds.) Emerging Research in Computing, Information, Communication and Applications, pp. 1–10. Springer, New Delhi (2015). https://doi.org/10.1007/978-81-322-2550-8_1
Iyer, S., Sedamkar, R.R., Gupta, S.: A novel idea on multimedia encryption using hybrid crypto approach. In: 7th International Conference on Communication, Computing and Virtualization, pp. 293–298. Elsevier (2016)
Shoukat, I., Bakar, K., Iftikhar, M.: A survey about the latest trends and research issues of cryptographic elements. Int. J. Comput. Sci. Issues 8(3), 140 (2011)
Shrivastava, M., Jain, S., Singh, P.: Content based symmetric key algorithm. In: International Conference on Computational Modeling and Security, pp. 222–227. Elsevier (2016)
Raja, Y., Perumal, S.: WSES: high secured data encryption and authentication using weaving, rotation and flipping. ICTACT J. Commun. Technol. 6(4), 1200–1207 (2015)
Mathur, N., Bansode, R.: AES based text encryption using 12 rounds with dynamic key selection. In: 7th International Conference on Communication, Computing and virtualization, pp. 1036–1043. Elsevier (2016)
Naik, M., Tungare, P., Kamble, P., Sabnis, S.: Color cryptography using substitution method. Int. Res. J. Eng. Technol. 3(3), 941–944 (2016)
Patel, P., Patel, R., Patel, N.: Integrated ECC and blowfish for smartphone security. In: International Conference on Information Security & Privacy, pp. 210–216. Elsevier, Nagpur (2015)
Kallam, R., Kumar, S., Babu, A.: A modern play color cipher involving dynamic permuted key with iterative and modular arithmetic functions. Int. J. Adv. Res. Comput. Sci. 2(3), 208–213 (2011)
Joshi, A., Wazid, M., Goudar, R.: An efficient cryptographic scheme for text message protection against brute force attack and cryptanalytic attacks. In: International Conference on Intelligent Computing, Communication & Convergence, pp. 360–366 (2015)
Bendovschi, A.: Cyber-attacks – trends, patterns and security countermeasures. In: 7th International Conference on Financial Criminology, pp. 24–31. Elsevier (2015)
Chandra, S., Mandal, B., Alam, Sk., Bhattacharyya, S.: Content based double encryption algorithm using symmetric key cryptography. In: International Conference on Recent Trends in Computing, pp. 1228–1234. Elsevier (2015)
Shemin, P.A., Vipinkumar, K.S.: E–payment system using visual and quantum cryptography. In: International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST), pp. 1623–1628. Elsevier (2016)
Pozo, I., Iturralde, M.: A encryption mechanism for instant messaging in mobile devices. In: International Workshop on Mobile Computing Security, pp. 533–538 (2015)
Ahmad, K., Shoaib, M.: E-commerce security through elliptic curve cryptography. In: International Conference on Information Security & Privacy (ICISP), pp. 867–873
Patil, P., Narayankar, P., Narayan, D.G, Meena, S.M.: A comprehensive evaluation of cryptography algortihms: DES, 3DES, AES, RSA and Blowfish. In: International Conference on Information Security & Privacy. Nagpur: ELSEVIER, pp. 617-624 (2015)
kester, Q., Nana, L., Pascu, A., Gire, S., Eghan, J., Quaynor, Nii.N.: A cryptographic technique for security of medical images in health information systems. In: The Second International Symposium on Computer Vision and the Internet (VisionNet): Signal Processing, Images Processing and Pattern Recognition (SIPP), pp. 538–543. Elsevier
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chaturvedi, A., Sengar, H.S. (2019). Improved Symmetric Key Technique Using Randomization. In: Verma, S., Tomar, R., Chaurasia, B., Singh, V., Abawajy, J. (eds) Communication, Networks and Computing. CNC 2018. Communications in Computer and Information Science, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-2372-0_38
Download citation
DOI: https://doi.org/10.1007/978-981-13-2372-0_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2371-3
Online ISBN: 978-981-13-2372-0
eBook Packages: Computer ScienceComputer Science (R0)