Open Access   Article Go Back

LFSR Based Block Cipher Technique for Text

Sakshi Dubey1 , Darpan Anand2 , Jayash Sharma3

  1. Dept. Of Computer Science Engineering, HITM, Agra, India.
  2. Dept. Of Computer Science Engineering, HITM, Agra, India.
  3. Dept. Of Computer Science Engineering, HITM, Agra, India.

Correspondence should be addressed to: Sakshidubey.19dec@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-2 , Page no. 53-60, Feb-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i2.5360

Online published on Feb 28, 2018

Copyright © Sakshi Dubey, Darpan Anand, Jayash Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sakshi Dubey, Darpan Anand, Jayash Sharma, “LFSR Based Block Cipher Technique for Text,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.2, pp.53-60, 2018.

MLA Style Citation: Sakshi Dubey, Darpan Anand, Jayash Sharma "LFSR Based Block Cipher Technique for Text." International Journal of Computer Sciences and Engineering 6.2 (2018): 53-60.

APA Style Citation: Sakshi Dubey, Darpan Anand, Jayash Sharma, (2018). LFSR Based Block Cipher Technique for Text. International Journal of Computer Sciences and Engineering, 6(2), 53-60.

BibTex Style Citation:
@article{Dubey_2018,
author = {Sakshi Dubey, Darpan Anand, Jayash Sharma},
title = {LFSR Based Block Cipher Technique for Text},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2018},
volume = {6},
Issue = {2},
month = {2},
year = {2018},
issn = {2347-2693},
pages = {53-60},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1700},
doi = {https://doi.org/10.26438/ijcse/v6i2.5360}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i2.5360}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1700
TI - LFSR Based Block Cipher Technique for Text
T2 - International Journal of Computer Sciences and Engineering
AU - Sakshi Dubey, Darpan Anand, Jayash Sharma
PY - 2018
DA - 2018/02/28
PB - IJCSE, Indore, INDIA
SP - 53-60
IS - 2
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
1214 692 downloads 374 downloads
  
  
           

Abstract

In the world of cryptography there are a lot of techniques and their simultaneous operations, which are used for making our data transmission better, secure and fast. Today to get more and more data transmission capabilities, people tend to compromise security of their data due to non availability of better cryptography techniques to suit different needs of their data transmission. Keeping this requirement of enhanced security in mind, some new techniques are making their way in cryptography, which are reliable, fast and give better data security for transmission of different kind of data (i.e. Text, Images, Videos etc.). In this paper, authors are proposing a cryptography method for enhanced encryption and decryption with help of LFSR (linear feedback shift register), which can reliably give much desired security with more speed. In this paper the method is used only for text, it could be further modified for 2D as well as 3D images.

Key-Words / Index Term

LFSR (Linear Feedback Shift Register); Encryption; Decryption; Cipher text; Block cipher

References

[1]. A. Joseph Amalraj, Dr.J. John Raybin Jose, “A Survey Paper of Cryptography Techniques” Issue.8, August 2016.
[2]. Rohit S and Vinay G “A Novel to Stage Binary image Security system Using (2, 2) Visual Cryptography Scheme”, ISSN: 2250-3005.
[3]. Prof. Mukund R.Joshi , Renuka Avinash Karkade, “Network Security With Cryptography” , Issue.1 , January 2015
[4]. A. Balasubramani, Ch.D.V Subba Rao, “Image Security Implementing Steganography and Cryptographic Methods”, International Journal of Computer Science and Engineering, Volume.6, Issue.1, January 2018.
[5]. Jawahar Thakur, Nagesh Kumar, “Des, Aes And Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis” International Journal Of Emerging Technology And Advanced Engineering, Volume 1, Issue 1, November 2011.
[6]. Sonia Rani, Harpreet Kaur, “Technical Review on Symmetric and Asymmetric Cryptography Algorithms.” Vol.8, May 2017.
[7]. Mini Malhotra, Aman Singh, “Study of various Cryptographic Algorithms”, Vol.1, Issue 3, November 2013.
[8]. Wang, Suli; Liu, Ganlai, “File encryption and decryption system based on RSA algorithm”, Computational and Information Sciences (ICCIS), pp. 797 – 800, 2011.
[9]. Suresh, V., and C. Saraswathy. "Separable reversible data hiding using Rc4 algorithm", 2013 International Conference on Pattern Recognition Informatics and Mobile Engineering, 2013.
[10]. R. L. Rivest, A. Shamir, and L. Adleman “A Method for Obtaining Digital Signatures and Public- Key Cryptosystems.” Communications of the ACM, vol. 26, no. 1, pp. 96–99, 1983
[11]. Faiqa Maqsood, Muhammad Ahmed, Muhammad Mumtaz, Munam Ali. "Cryptography: A Comparative Analysis for Modern Techniques", International Journal of Advanced Computer Science and Applications, 2017
[12]. M. E. Student, “Algorithms for Secure Cloud,” vol. 3, no. 6, pp. 1–9, 2014
[13]. P. Nalwaya, V. P. Saxena, and P. Nalwaya, “A cryptographic approach based on integrating running key in feedback mode of elgamal system,” Proc. - 2014 6th Int. Conf. Comput. Intell. Commun. Networks, CICN 2014, pp. 719–724, 2014.
[14]. X. Li, X. Shen, and H. Chen, “ElGamal digital signature algorithm of adding a random number,” J. Networks, vol. 6, no. 5, pp. 774–782, 2011
[15]. M. S. Anoop, “Elliptic Curve Cryptography,” Infosecwriters, pp. 1–11, 2015
[16]. Alok Kumar Kasgar, Mukesh Kumar Dhariwal,”A Review Paper Of Message Digest 5(MD5)”, Volume 1, Issue 4, December 2013
[17]. Chaitya B. Shah, Drashti R. Panchal, “Secured Hash Algorithm-1: Review Paper”, Volume 2, Issue X, October 2014.
[18]. Tang Songsheng, Ma Xianzhen,”Research of typical block cipher algorithm”, Computer, Mechatronics, Control and Electronic Engineering (CMCE), pp. 319 – 321, 2010.
[19]. Wenxue Tan ; Wang Xiping ; Jinju Xi ; Meisen Pan , “A mechanism of quantitating the security strength of RSA key”, Electronic Commerce and Security (ISECS), pp. 357 – 361, 2010.
[20]. Aarti Devi, Ankush Sharma, Anamika Rangra, “Performance Analysis Of Symmetric Key Algorithms: Des, Aes And Blowfish For Image Encryption And Decryption” International Journal Of Engineering And Computer Science Volume 4 Issue 6 June 2015
[21]. G. Ramesh1 Dr. R. Umarani, “Performance Analysis of Most Common Symmetrical Encryption Algorithms” International Journal of Power Control Signal and Computation (IJPCSC) Vol 3. No 1. Jan-Mar 2012.
[22]. Jitendra Singh Laser, Viny Jain, “A Comparative Survey Of Various Cryptographic Techniques” International Research Journal Of Engineering And Technology (IRJET), Volume: 03 Issue: 03 | Mar-2016
[23]. Md. Alam Hossain, Md. Biddut Hossain, Md. Shafin Uddin, Shariar Md. Imtiaz, “Performance Analysis Of Different Cryptography Algorithms”, International Journal Of Advanced Research In Computer Science And Software Engineering Volume 6, Issue 3, March 2016.
[24]. Dr. D. Vimal Kumar, Mrs. J. Divya Jose, “Over View of Cryptographic Algorithms for Information Security” International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 5, May 2016.
[25]. Siddesh Gaonkar, “Design Of 8bit, 16bit and 32bit LFSR For PN Sequence Generation Using VHDL”, Issue 31(September, 2015)
[26]. Sumitra, “Comparative Analysis of AES and DES Security Algorithms”, Volume 3, Issue 1, January 2013.