New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm

In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors introduced new bit manipulation method for data encryption and decryption of any file. Nath et al already developed some symmetric key methods where they have used some random...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Khanna, N., Nath, J., James, J., Chakraborty, S., Chakrabarti, A., Nath, A.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 130
container_issue
container_start_page 125
container_title
container_volume
creator Khanna, N.
Nath, J.
James, J.
Chakraborty, S.
Chakrabarti, A.
Nath, A.
description In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors introduced new bit manipulation method for data encryption and decryption of any file. Nath et al already developed some symmetric key methods where they have used some randomized key matrix for encryption and decryption methods. In the present work the authors have used a bit manipulation method which include bit exchange, right shift and XOR operation on the incoming bits. To exchange bits the authors used a randomized key matrix of size (16×16) using the method developed by Nath et al. The present method allows the multiple encryption and multiple decryption. To initiate the encryption process a user has to enter a text-key which may be maximum of 16 characters long. From the text-key the authors have calculated randomization number and the encryption number. The method used was developed by Nath et al. A slight change in the text-key will change the randomization number and the encryption number quite a lot. Multiple encryption using bit exchange, bit right shift and XOR operations makes the system very secured. The present method is a block cipher method and it can be applied to encrypt data in sensor network or in mobile network. The advantage of the present method is that one can apply this method on top of any other standard algorithm such as DES, AES or RSA. The method is suitable to encrypt any large or small file. There is a scope to further enhance the present method of encryption.
doi_str_mv 10.1109/CSNT.2011.33
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5966419</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5966419</ieee_id><sourcerecordid>5966419</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-267fb814f9c76827566fdb1d034e4125f46c33c771aafebe6ad7e599e0e3c0963</originalsourceid><addsrcrecordid>eNpdT81Og0AYXGNMNJWbNy_7AtRd9q_rDUmt1hYP4LlZ4IOugYUAxvACPretmh48TWYmM5NB6IaSOaVE30VJnM4DQumcsTPkabUgSmrBOVPs_IdTLpQigjN-ibxheCeEUC2VDNgV-orhEydT08DY2xy_wISjfurGtupNtz8oYV21vR33DX4brKtw1DaZdVDgBzvirXG2-6jNaFuHjSvwNgnx0uXHhqN0Ct_jeL1OwvDf1Mm_RhelqQfw_nCG0sdlGj35m9fVcxRufKvJ6AdSldnhTqlzJReBElKWRUYLwjhwGoiSy5yxXClqTAkZSFMoEFoDAZYTLdkM3f7WWgDYdb1tTD_thJaSU82-AdOdYuI</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Khanna, N. ; Nath, J. ; James, J. ; Chakraborty, S. ; Chakrabarti, A. ; Nath, A.</creator><creatorcontrib>Khanna, N. ; Nath, J. ; James, J. ; Chakraborty, S. ; Chakrabarti, A. ; Nath, A.</creatorcontrib><description>In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors introduced new bit manipulation method for data encryption and decryption of any file. Nath et al already developed some symmetric key methods where they have used some randomized key matrix for encryption and decryption methods. In the present work the authors have used a bit manipulation method which include bit exchange, right shift and XOR operation on the incoming bits. To exchange bits the authors used a randomized key matrix of size (16×16) using the method developed by Nath et al. The present method allows the multiple encryption and multiple decryption. To initiate the encryption process a user has to enter a text-key which may be maximum of 16 characters long. From the text-key the authors have calculated randomization number and the encryption number. The method used was developed by Nath et al. A slight change in the text-key will change the randomization number and the encryption number quite a lot. Multiple encryption using bit exchange, bit right shift and XOR operations makes the system very secured. The present method is a block cipher method and it can be applied to encrypt data in sensor network or in mobile network. The advantage of the present method is that one can apply this method on top of any other standard algorithm such as DES, AES or RSA. The method is suitable to encrypt any large or small file. There is a scope to further enhance the present method of encryption.</description><identifier>ISBN: 9781457705434</identifier><identifier>ISBN: 1457705435</identifier><identifier>EISBN: 9780769544373</identifier><identifier>EISBN: 0769544371</identifier><identifier>DOI: 10.1109/CSNT.2011.33</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer science ; Computers ; Decryption ; Educational institutions ; Encryption ; Left Shift ; MSA Algorithm ; Postal services ; Right Shift ; XOR</subject><ispartof>2011 International Conference on Communication Systems and Network Technologies, 2011, p.125-130</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5966419$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5966419$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Khanna, N.</creatorcontrib><creatorcontrib>Nath, J.</creatorcontrib><creatorcontrib>James, J.</creatorcontrib><creatorcontrib>Chakraborty, S.</creatorcontrib><creatorcontrib>Chakrabarti, A.</creatorcontrib><creatorcontrib>Nath, A.</creatorcontrib><title>New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm</title><title>2011 International Conference on Communication Systems and Network Technologies</title><addtitle>csnt</addtitle><description>In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors introduced new bit manipulation method for data encryption and decryption of any file. Nath et al already developed some symmetric key methods where they have used some randomized key matrix for encryption and decryption methods. In the present work the authors have used a bit manipulation method which include bit exchange, right shift and XOR operation on the incoming bits. To exchange bits the authors used a randomized key matrix of size (16×16) using the method developed by Nath et al. The present method allows the multiple encryption and multiple decryption. To initiate the encryption process a user has to enter a text-key which may be maximum of 16 characters long. From the text-key the authors have calculated randomization number and the encryption number. The method used was developed by Nath et al. A slight change in the text-key will change the randomization number and the encryption number quite a lot. Multiple encryption using bit exchange, bit right shift and XOR operations makes the system very secured. The present method is a block cipher method and it can be applied to encrypt data in sensor network or in mobile network. The advantage of the present method is that one can apply this method on top of any other standard algorithm such as DES, AES or RSA. The method is suitable to encrypt any large or small file. There is a scope to further enhance the present method of encryption.</description><subject>Computer science</subject><subject>Computers</subject><subject>Decryption</subject><subject>Educational institutions</subject><subject>Encryption</subject><subject>Left Shift</subject><subject>MSA Algorithm</subject><subject>Postal services</subject><subject>Right Shift</subject><subject>XOR</subject><isbn>9781457705434</isbn><isbn>1457705435</isbn><isbn>9780769544373</isbn><isbn>0769544371</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpdT81Og0AYXGNMNJWbNy_7AtRd9q_rDUmt1hYP4LlZ4IOugYUAxvACPretmh48TWYmM5NB6IaSOaVE30VJnM4DQumcsTPkabUgSmrBOVPs_IdTLpQigjN-ibxheCeEUC2VDNgV-orhEydT08DY2xy_wISjfurGtupNtz8oYV21vR33DX4brKtw1DaZdVDgBzvirXG2-6jNaFuHjSvwNgnx0uXHhqN0Ct_jeL1OwvDf1Mm_RhelqQfw_nCG0sdlGj35m9fVcxRufKvJ6AdSldnhTqlzJReBElKWRUYLwjhwGoiSy5yxXClqTAkZSFMoEFoDAZYTLdkM3f7WWgDYdb1tTD_thJaSU82-AdOdYuI</recordid><startdate>201106</startdate><enddate>201106</enddate><creator>Khanna, N.</creator><creator>Nath, J.</creator><creator>James, J.</creator><creator>Chakraborty, S.</creator><creator>Chakrabarti, A.</creator><creator>Nath, A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201106</creationdate><title>New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm</title><author>Khanna, N. ; Nath, J. ; James, J. ; Chakraborty, S. ; Chakrabarti, A. ; Nath, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-267fb814f9c76827566fdb1d034e4125f46c33c771aafebe6ad7e599e0e3c0963</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computer science</topic><topic>Computers</topic><topic>Decryption</topic><topic>Educational institutions</topic><topic>Encryption</topic><topic>Left Shift</topic><topic>MSA Algorithm</topic><topic>Postal services</topic><topic>Right Shift</topic><topic>XOR</topic><toplevel>online_resources</toplevel><creatorcontrib>Khanna, N.</creatorcontrib><creatorcontrib>Nath, J.</creatorcontrib><creatorcontrib>James, J.</creatorcontrib><creatorcontrib>Chakraborty, S.</creatorcontrib><creatorcontrib>Chakrabarti, A.</creatorcontrib><creatorcontrib>Nath, A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Khanna, N.</au><au>Nath, J.</au><au>James, J.</au><au>Chakraborty, S.</au><au>Chakrabarti, A.</au><au>Nath, A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm</atitle><btitle>2011 International Conference on Communication Systems and Network Technologies</btitle><stitle>csnt</stitle><date>2011-06</date><risdate>2011</risdate><spage>125</spage><epage>130</epage><pages>125-130</pages><isbn>9781457705434</isbn><isbn>1457705435</isbn><eisbn>9780769544373</eisbn><eisbn>0769544371</eisbn><abstract>In the present work the authors have introduced a new advanced symmetric key cryptographic method called NJJSAA. The authors introduced new bit manipulation method for data encryption and decryption of any file. Nath et al already developed some symmetric key methods where they have used some randomized key matrix for encryption and decryption methods. In the present work the authors have used a bit manipulation method which include bit exchange, right shift and XOR operation on the incoming bits. To exchange bits the authors used a randomized key matrix of size (16×16) using the method developed by Nath et al. The present method allows the multiple encryption and multiple decryption. To initiate the encryption process a user has to enter a text-key which may be maximum of 16 characters long. From the text-key the authors have calculated randomization number and the encryption number. The method used was developed by Nath et al. A slight change in the text-key will change the randomization number and the encryption number quite a lot. Multiple encryption using bit exchange, bit right shift and XOR operations makes the system very secured. The present method is a block cipher method and it can be applied to encrypt data in sensor network or in mobile network. The advantage of the present method is that one can apply this method on top of any other standard algorithm such as DES, AES or RSA. The method is suitable to encrypt any large or small file. There is a scope to further enhance the present method of encryption.</abstract><pub>IEEE</pub><doi>10.1109/CSNT.2011.33</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781457705434
ispartof 2011 International Conference on Communication Systems and Network Technologies, 2011, p.125-130
issn
language eng
recordid cdi_ieee_primary_5966419
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Computer science
Computers
Decryption
Educational institutions
Encryption
Left Shift
MSA Algorithm
Postal services
Right Shift
XOR
title New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-03T15%3A41%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=New%20Symmetric%20Key%20Cryptographic%20Algorithm%20Using%20Combined%20Bit%20Manipulation%20and%20MSA%20Encryption%20Algorithm:%20NJJSAA%20Symmetric%20Key%20Algorithm&rft.btitle=2011%20International%20Conference%20on%20Communication%20Systems%20and%20Network%20Technologies&rft.au=Khanna,%20N.&rft.date=2011-06&rft.spage=125&rft.epage=130&rft.pages=125-130&rft.isbn=9781457705434&rft.isbn_list=1457705435&rft_id=info:doi/10.1109/CSNT.2011.33&rft_dat=%3Cieee_6IE%3E5966419%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769544373&rft.eisbn_list=0769544371&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5966419&rfr_iscdi=true