Skip to main content

Improved Symmetric Key Technique Using Randomization

  • Conference paper
  • First Online:
Communication, Networks and Computing (CNC 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 839))

Included in the following conference series:

  • 975 Accesses

Abstract

Cryptography is the process of turning something readable into something unreadable. Nowadays, internet is being used by the people for exchanging information electronically. The rapid growth of internet increased the number of electronic transactions made by internet users. The information traveled over the internet is very much confidential which need to be secured from unauthorized access, resulted the need of cryptography. In this paper, an innovative technique has been proposed where the three symmetric keys were generated through a randomization process and used for encryption and decryption. Combination of three random keys was used in the encryption process which makes this technique unbreakable and secured against brute force attack and other similar attacks. This technique generates different-different ciphertext each time for the same message which also ensures the protection against various cryptanalytic attacks. This technique can be used to encrypt and decrypt the alphanumeric data in milliseconds which makes the technique more efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Johari, R., Bhatia, H., Singh, S., Chauhan, M.: Triplicative cipher technique. In: International Conference on Information Security and Privacy, pp. 217–223. Elsevier, New Delhi (2015)

    Google Scholar 

  2. Kamalakannan, V., Tamilselvan, S.: Security enhancement of text message based on matrix approach using elliptical curve cryptosystem. In: 2nd International Conference on Nanomaterials and Technologies (CNT), pp. 489–496. ELSEVIER (2015)

    Google Scholar 

  3. Singh, L., Singh, K.: Implementation of text encryption using elliptic curve cryptography. In: Eleventh International Multi-Conference on Information Processing, pp. 73–82. Elsevier (2015)

    Google Scholar 

  4. Paira, S., Chandra, S., Safikul Alam, S., Bhattacharyya, S.: Symmetric key encryption through data structure and binary-gray conversion. In: Shetty, N.R., Prasad, N.H., Nalini, N. (eds.) Emerging Research in Computing, Information, Communication and Applications, pp. 1–10. Springer, New Delhi (2015). https://doi.org/10.1007/978-81-322-2550-8_1

    Chapter  Google Scholar 

  5. Iyer, S., Sedamkar, R.R., Gupta, S.: A novel idea on multimedia encryption using hybrid crypto approach. In: 7th International Conference on Communication, Computing and Virtualization, pp. 293–298. Elsevier (2016)

    Google Scholar 

  6. Shoukat, I., Bakar, K., Iftikhar, M.: A survey about the latest trends and research issues of cryptographic elements. Int. J. Comput. Sci. Issues 8(3), 140 (2011)

    Google Scholar 

  7. Shrivastava, M., Jain, S., Singh, P.: Content based symmetric key algorithm. In: International Conference on Computational Modeling and Security, pp. 222–227. Elsevier (2016)

    Google Scholar 

  8. Raja, Y., Perumal, S.: WSES: high secured data encryption and authentication using weaving, rotation and flipping. ICTACT J. Commun. Technol. 6(4), 1200–1207 (2015)

    Article  Google Scholar 

  9. Mathur, N., Bansode, R.: AES based text encryption using 12 rounds with dynamic key selection. In: 7th International Conference on Communication, Computing and virtualization, pp. 1036–1043. Elsevier (2016)

    Google Scholar 

  10. Naik, M., Tungare, P., Kamble, P., Sabnis, S.: Color cryptography using substitution method. Int. Res. J. Eng. Technol. 3(3), 941–944 (2016)

    Google Scholar 

  11. Patel, P., Patel, R., Patel, N.: Integrated ECC and blowfish for smartphone security. In: International Conference on Information Security & Privacy, pp. 210–216. Elsevier, Nagpur (2015)

    Google Scholar 

  12. Kallam, R., Kumar, S., Babu, A.: A modern play color cipher involving dynamic permuted key with iterative and modular arithmetic functions. Int. J. Adv. Res. Comput. Sci. 2(3), 208–213 (2011)

    Google Scholar 

  13. Joshi, A., Wazid, M., Goudar, R.: An efficient cryptographic scheme for text message protection against brute force attack and cryptanalytic attacks. In: International Conference on Intelligent Computing, Communication & Convergence, pp. 360–366 (2015)

    Google Scholar 

  14. Bendovschi, A.: Cyber-attacks – trends, patterns and security countermeasures. In: 7th International Conference on Financial Criminology, pp. 24–31. Elsevier (2015)

    Google Scholar 

  15. Chandra, S., Mandal, B., Alam, Sk., Bhattacharyya, S.: Content based double encryption algorithm using symmetric key cryptography. In: International Conference on Recent Trends in Computing, pp. 1228–1234. Elsevier (2015)

    Google Scholar 

  16. Shemin, P.A., Vipinkumar, K.S.: E–payment system using visual and quantum cryptography. In: International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST), pp. 1623–1628. Elsevier (2016)

    Google Scholar 

  17. Pozo, I., Iturralde, M.: A encryption mechanism for instant messaging in mobile devices. In: International Workshop on Mobile Computing Security, pp. 533–538 (2015)

    Google Scholar 

  18. Ahmad, K., Shoaib, M.: E-commerce security through elliptic curve cryptography. In: International Conference on Information Security & Privacy (ICISP), pp. 867–873

    Google Scholar 

  19. Patil, P., Narayankar, P., Narayan, D.G, Meena, S.M.: A comprehensive evaluation of cryptography algortihms: DES, 3DES, AES, RSA and Blowfish. In: International Conference on Information Security & Privacy. Nagpur: ELSEVIER, pp. 617-624 (2015)

    Google Scholar 

  20. kester, Q., Nana, L., Pascu, A., Gire, S., Eghan, J., Quaynor, Nii.N.: A cryptographic technique for security of medical images in health information systems. In: The Second International Symposium on Computer Vision and the Internet (VisionNet): Signal Processing, Images Processing and Pattern Recognition (SIPP), pp. 538–543. Elsevier

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hirendra Singh Sengar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chaturvedi, A., Sengar, H.S. (2019). Improved Symmetric Key Technique Using Randomization. In: Verma, S., Tomar, R., Chaurasia, B., Singh, V., Abawajy, J. (eds) Communication, Networks and Computing. CNC 2018. Communications in Computer and Information Science, vol 839. Springer, Singapore. https://doi.org/10.1007/978-981-13-2372-0_38

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2372-0_38

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2371-3

  • Online ISBN: 978-981-13-2372-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics