A Private Key Encryption Scheme based on Amicable Number with User defined Cipher Block Sequencing Techniques
|R. Das1 , S. Dutta2|
1 Development Officer, Bankura University, Bankura-722155, W.B., India.
2 Department of Computer Applications, Dr. B. C. Roy Engineering College, Durgapur-713206, WB, India.
Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 34-41, May-2018
Online published on May 31, 2018
Copyright © R. Das, S. Dutta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
|View this paper at Google Scholar | DPI Digital Library|
|XML View||PDF Download|
IEEE Style Citation: R. Das, S. Dutta, “A Private Key Encryption Scheme based on Amicable Number with User defined Cipher Block Sequencing Techniques”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.34-41, 2018.
MLA Style Citation: R. Das, S. Dutta "A Private Key Encryption Scheme based on Amicable Number with User defined Cipher Block Sequencing Techniques." International Journal of Computer Sciences and Engineering 6.5 (2018): 34-41.
APA Style Citation: R. Das, S. Dutta, (2018). A Private Key Encryption Scheme based on Amicable Number with User defined Cipher Block Sequencing Techniques. International Journal of Computer Sciences and Engineering, 6(5), 34-41.
|117||118 downloads||11 downloads|
|Same secret key is used for encryption and decryption in Private Key cryptography. Many of the existing private key cryptography systems lacking their security as distribution of the private-key through public communication channel without interpretation is very hard to achieve. So here our focus is on the secret procedure which retrieves secret value used for encryption from the private-key rather than securing the actual private-key value. The secret value is being derived by taking the first or second item from Nth pair of Amicable number set. Where N is a user defined positive integer in the range of (1<=N<=1024). The counting of Nth pair is being started from a user defined base value towards its forward or backward direction. We impose another level of security by implementing some user defined sequence for positioning encrypted characters block wise in cipher text file. Thus an attempt is made to increase the security in great extant.|
|Key-Words / Index Term :|
|Amicable number, private key encryption, block cipher, character’s positioning sequence|
 J. K. Mandal and Mangalmay Das, “Fibonacci Based Position Substitution (FBPS) Encoder for Secured Message Transmission”, IEEE International Advance Computing Conference (IACC) Patiala, India, pp.964-970, 6-7 March 2009.
 Udepal Singh and Upasna Garg, “An ASCII value based text data encryption System”, “International Journal of Scientific and Research Publications ( ISSN 2250-3153)”, Volume 3, Issue 11, pp. 1-5,November 2013.
 Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography”, “Eleventh International Multi-Conference on Information Processing-2015 (IMCIP-2015)”,” Procedia Computer Science”, doi: 10.1016/j.procs.2015.06.009, Volume 54, pp. 73-82,2015.
 Nishtha Mathur and Rajesh Bansode, “AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection”, “7th International Conference on Communication, Computing and Virtualization 2016”,” Procedia Computer Science”, doi: 10.1016/ j.procs. 2016 .03.131, Volume 79, pp. 1036-1043, 2016.
 Snehal Sherkhane, Amit Waghmare, Suraj Dalvi, Shreya Bamne, “Hybrid Data Encryption using Colour code and Armstrong number”, “International Journal of Engineering Science and Computing”, Volume 7, Issue 4, pp. 10300-10305,April,2017.
 Kiran Kumar R and Bharathi Devi P, “A Novel Text Encryption Algorithm Using DNA ASCII Table With A Spiral Approach”, “International Journal of Recent Scientific Research”, Volume 9, Issue 1, pp. 23588-23595, DOI: 10.24327/ijrsr.2018.0901.1495,2018.
 J. K. Mandal, S. Dutta, “A 256-bit recursive pair parity encoder for encryption ”, Advances D -2004, Vol. 9 nº1, Association for the Advancement of Modeling and Simulation Techniques in Enterprises (AMSE, France), www. AMSE-Modeling.org, pp. 1-14.
 William Stallings, Cryptography and Network security: Principles and practice (Second Edition), Pearson Education Asia, Sixth Indian Reprint 2002.
 Atul Kahate (Manager, i-flex solution limited, Pune, India), Cryptography and Network security, Tata McGraw-Hill Publishing Company Limited.
 Private Key cryptography on text [online] Available: https://koolspan.com/private-key-encryption/.