NHSKCA: A NEW HEURISTIC FOR SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM
Ira Nath, Deepashree Bhattacharyya, Agnisuddha Mandal, Nandini Kundu and Oindrila De, ,
Affiliations JIS College of Engineering, Kalyani, Nadia, West Bengal, 741235
:10.22362/ijcert/2017/v4/i12/xxxx [UNDER PROCESS]
A plain text or clear text is basically any communicating language that human being speaks. A message or plain text can be understood by anybody who knows the language and as long as the message is not codified in any manner. So now we have to use coding scheme to ensure the information is hidden from anyone for whom it is not intended even those who can see the coded data. Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography is the practice and study of hiding information. In modern times cryptography is considered as a branch of both mathematics and computer science and is affiliated closely with information theory, computer science and engineering. There are two basic types of cryptography-Symmetric key and asymmetric key cryptography. There are few well known symmetric key algorithms i.e, DES, RSA, MD5, etc. This paper describes cryptography, various symmetric key algorithms in detail and then proposes a new symmetric key algorithm. Algorithms for both encryption and decryption are also provided here. The advantages of this new algorithm are also explained properly.
Ira Nath,Deepashree Bhattacharyya Agnisuddha Mandal, Nandini Kundu and Oindrila De (2017). NHSKCA: A NEW HEURISTIC FOR SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM. International Journal of Computer Engineering In Research Trends, 4(12), 547-553. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I1202.pdf
1. Debasis Das, U.A. Lanjewar and S.J. Sharma,“The Art of Cryptology: From Ancient Number System to Strange Number System”, IJAIEM, Volume 2, Issue 4, April 2013, ISSN 2319-4847.
2. David Naccache, “Cryptography and Security: From Theory to Applications”, Springer, 2012.
3. H.B. Pethe, Dr. S. R. Pande, “An overview of Cryptographic Hash Function M-5 and SHA”, IOSR-JCE, 2016.
4. Ius Mentis: Law and technology explained, “The MD5 cryptographic hash function”, Oct 1, 2005.
5. Alok Kumar Kasgar, Mukesh Kumar Dhariwal, NeerajnTantubay, Hina Malviya, “A Review Paper of Message Digest 5 (MD5)”, IJMEMR, Volume1, Issue 4, December 2013, ISSN: 2320-9984 (Online).
6. Evgeny Milanov, “The RSA Algorithm”, June, 2009.
7. Avi Kak, “Public-Key Cryptography and the RSA Algorithm”, Lecture Notes on “Computer and Network Security”, February 16, 2017.
8. William Stallings, “Cryptography and Network Security: Principles and Practices”, Publisher: Prentice Hall, November 16, 2005, Pages-592.