首页> 外文会议>International Conference on Computational Intelligence and Communication Networks >Bit Level Encryption Algorithm - Implementation of Bit-wise operations and randomized Bit-wise Columnar Transposition method
【24h】

Bit Level Encryption Algorithm - Implementation of Bit-wise operations and randomized Bit-wise Columnar Transposition method

机译:比特级加密算法 - 实现比特 - 明智的操作和随机位柱状柱状rountPosition方法的实现

获取原文

摘要

In the present paper the authors have introduced a new symmetric key cryptographic method which is based on several bit level operations on any plain text file. In the present study the authors have three ways simultaneous feedback method applied along three dimensions on plain text. In the present method the authors have introduced few simple bit-level operations in random order. Initially the entire plain text file is converted into bits and then using random key generator method (MSA) all bits were substituted in a two dimensional matrix. The size of the matrix will be calculated from user entered secret key-string. After entering bits in a matrix some bit-wise operations were applied such as bit-wise complement in some random places and after that bit-wise x-or and finally the columns are reshuffled in a random order to make the whole system complex. The present method tested on various standard plain text files and the result shows that present method is free from standard cryptographic attack such as known plain text attack, brute force attack, differential attack, statistical attack. As the entire encryption method is based on bit levels so it is very much sensitive on input pattern. The present method may be applied in sensor networks, defense, any corporate sectors etc.
机译:在本文中,作者引入了一种新的对称密钥加密方法,该方法基于任何纯文本文件的几个位级别操作。在本研究中,作者有三种沿着纯文本上三维应用的同时反馈方法。在本方法中,作者以随机顺序引入了一些简单的比特级操作。最初,整个纯文本文件被转换为位,然后使用随机密钥生成方法(MSA)所有位以二维矩阵代替。将从用户输入的密钥字符串计算矩阵的大小。在矩阵中输入位之后,在一些随机的位置,在某个随机位置处诸如比特方向的诸如比特 - 或者最后,列以随机顺序重新装饰,以使整个系统复合地重新制作整个系统复合。目前的方法在各种标准纯文本文件上测试,结果表明现有方法是没有标准加密攻击,如已知的纯文本攻击,蛮力攻击,差异攻击,统计攻击。随着整个加密方法基于位级别,因此它对输入模式非常敏感。本方法可以应用于传感器网络,防御,任何公司扇区等。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号