Bit Level Encryption Algorithm Using Chaos Version 1.0(BLEAUC-1.0)
Asoke Nath1 , Suchandra Datta2 , Souptik Kumar Majumdar3
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-4 , Page no. 451-456, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.451456
Online published on Apr 30, 2019
Copyright © Asoke Nath, Suchandra Datta, Souptik Kumar Majumdar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Asoke Nath, Suchandra Datta, Souptik Kumar Majumdar, “Bit Level Encryption Algorithm Using Chaos Version 1.0(BLEAUC-1.0),” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.451-456, 2019.
MLA Style Citation: Asoke Nath, Suchandra Datta, Souptik Kumar Majumdar "Bit Level Encryption Algorithm Using Chaos Version 1.0(BLEAUC-1.0)." International Journal of Computer Sciences and Engineering 7.4 (2019): 451-456.
APA Style Citation: Asoke Nath, Suchandra Datta, Souptik Kumar Majumdar, (2019). Bit Level Encryption Algorithm Using Chaos Version 1.0(BLEAUC-1.0). International Journal of Computer Sciences and Engineering, 7(4), 451-456.
BibTex Style Citation:
@article{Nath_2019,
author = {Asoke Nath, Suchandra Datta, Souptik Kumar Majumdar},
title = {Bit Level Encryption Algorithm Using Chaos Version 1.0(BLEAUC-1.0)},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {451-456},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4056},
doi = {https://doi.org/10.26438/ijcse/v7i4.451456}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.451456}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4056
TI - Bit Level Encryption Algorithm Using Chaos Version 1.0(BLEAUC-1.0)
T2 - International Journal of Computer Sciences and Engineering
AU - Asoke Nath, Suchandra Datta, Souptik Kumar Majumdar
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 451-456
IS - 4
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
524 | 375 downloads | 215 downloads |
Abstract
Cryptographic algorithms attempt to generate ciphertexts which are as seemingly unrelated to the plain text as possible. We attempt to add a further improvement to existing bit level encryption by incorporating chaos through Game of Life. Chaos is introduced in our algorithm to make the enciphering process even more random. This is made possible by using a reversible encryption process using XOR operation in the encryption algorithm. The algorithm is very bit sensitive i.e. any change in plain text bits will produce a completely different result: cipher text using the same key. The main focus of our algorithm was to introduce randomness in encryption which has been achieved by generating a random matrix consisting of dead and alive cells. The said matrix is used for encryption. The matrix generated is seemingly random depending upon the key given. Thus, achieving the desired target of making the encryption and decryption algorithm even more complex.
Key-Words / Index Term
Bit level encryption; differential attack; brute force attack; leftshift; rightshift; chaos using game of life matrix; DNAsequence
References
[1]. Asoke Nath, Soumyadip Ray, Salil Anthony Dhara, Sourav Hazra
“3-DIMENSIONAL BIT LEVEL ENCRYPTION ALGORITHM VERSION-3 (3DBLEA-3)” International Journal of Latest Trends in Engineering and Technology Vol.(10)Issue(2), pp.347-353 May 2018
[2]. Behrouz A. Forouzan, “Cryptography and Network Security”, Special Indian edition 2007, Tata Mc-Graw Hill publishing company limited
[3]. Asoke Nath, Ayan Ghosh, Enakshi Ghosh and Jayisha Saha, ”3-Dimensional Bit Level Encryption Algorithm Ver-2(3DBLEA-2)”, , International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol. 4, page: : 8611-8618 Issue 5, MAY 2017.
[4]. Asoke Nath, Saima Ghosh, MeheboobAlam Mallik, “Symmetric Key Cryptography using Random Key generator” Proceedings of International conference on security and management (SAM-10) held at Las Vegas, USA, July 12-15, 2010, Vol-2, Page: 239-244(2010).