Open Access   Article Go Back

A Private Key Encryption Scheme based on Amicable Number with User defined Cipher Block Sequencing Techniques

R. Das1 , S. Dutta2

  1. Development Officer, Bankura University, Bankura-722155, W.B., India.
  2. Department of Computer Applications, Dr. B. C. Roy Engineering College, Durgapur-713206, WB, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 34-41, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.3441

Online published on May 31, 2018

Copyright © R. Das, S. Dutta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Das, S. Dutta, “A Private Key Encryption Scheme based on Amicable Number with User defined Cipher Block Sequencing Techniques,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.34-41, 2018.

MLA Style Citation: R. Das, S. Dutta "A Private Key Encryption Scheme based on Amicable Number with User defined Cipher Block Sequencing Techniques." International Journal of Computer Sciences and Engineering 6.5 (2018): 34-41.

APA Style Citation: R. Das, S. Dutta, (2018). A Private Key Encryption Scheme based on Amicable Number with User defined Cipher Block Sequencing Techniques. International Journal of Computer Sciences and Engineering, 6(5), 34-41.

BibTex Style Citation:
@article{Das_2018,
author = {R. Das, S. Dutta},
title = {A Private Key Encryption Scheme based on Amicable Number with User defined Cipher Block Sequencing Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {34-41},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1935},
doi = {https://doi.org/10.26438/ijcse/v6i5.3441}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.3441}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1935
TI - A Private Key Encryption Scheme based on Amicable Number with User defined Cipher Block Sequencing Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - R. Das, S. Dutta
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 34-41
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
1348 769 downloads 327 downloads
  
  
           

Abstract

Same secret key is used for encryption and decryption in Private Key cryptography. Many of the existing private key cryptography systems lacking their security as distribution of the private-key through public communication channel without interpretation is very hard to achieve. So here our focus is on the secret procedure which retrieves secret value used for encryption from the private-key rather than securing the actual private-key value. The secret value is being derived by taking the first or second item from Nth pair of Amicable number set. Where N is a user defined positive integer in the range of (1<=N<=1024). The counting of Nth pair is being started from a user defined base value towards its forward or backward direction. We impose another level of security by implementing some user defined sequence for positioning encrypted characters block wise in cipher text file. Thus an attempt is made to increase the security in great extant.

Key-Words / Index Term

Amicable number, private key encryption, block cipher, character’s positioning sequence

References

[1] J. K. Mandal and Mangalmay Das, “Fibonacci Based Position Substitution (FBPS) Encoder for Secured Message Transmission”, IEEE International Advance Computing Conference (IACC) Patiala, India, pp.964-970, 6-7 March 2009.
[2] Udepal Singh and Upasna Garg, “An ASCII value based text data encryption System”, “International Journal of Scientific and Research Publications ( ISSN 2250-3153)”, Volume 3, Issue 11, pp. 1-5,November 2013.
[3] Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography”, “Eleventh International Multi-Conference on Information Processing-2015 (IMCIP-2015)”,” Procedia Computer Science”, doi: 10.1016/j.procs.2015.06.009, Volume 54, pp. 73-82,2015.
[4] Nishtha Mathur and Rajesh Bansode, “AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection”, “7th International Conference on Communication, Computing and Virtualization 2016”,” Procedia Computer Science”, doi: 10.1016/ j.procs. 2016 .03.131, Volume 79, pp. 1036-1043, 2016.
[5] Snehal Sherkhane, Amit Waghmare, Suraj Dalvi, Shreya Bamne, “Hybrid Data Encryption using Colour code and Armstrong number”, “International Journal of Engineering Science and Computing”, Volume 7, Issue 4, pp. 10300-10305,April,2017.
[6] Kiran Kumar R and Bharathi Devi P, “A Novel Text Encryption Algorithm Using DNA ASCII Table With A Spiral Approach”, “International Journal of Recent Scientific Research”, Volume 9, Issue 1, pp. 23588-23595, DOI: 10.24327/ijrsr.2018.0901.1495,2018.
[7] J. K. Mandal, S. Dutta, “A 256-bit recursive pair parity encoder for encryption ”, Advances D -2004, Vol. 9 nº1, Association for the Advancement of Modeling and Simulation Techniques in Enterprises (AMSE, France), www. AMSE-Modeling.org, pp. 1-14.
[8] William Stallings, Cryptography and Network security: Principles and practice (Second Edition), Pearson Education Asia, Sixth Indian Reprint 2002.
[9] Atul Kahate (Manager, i-flex solution limited, Pune, India), Cryptography and Network security, Tata McGraw-Hill Publishing Company Limited.
[10] Private Key cryptography on text [online] Available: https://koolspan.com/private-key-encryption/.