Rotational Cryptographic Technique (RCT)

  • Debajyoti GuhaEmail author
  • Rajdeep Chakraborty
  • J. K. Mandal
Conference paper
Part of the Learning and Analytics in Intelligent Systems book series (LAIS, volume 12)


A Security scheme based on Block Cipher is being designed where the Encoding and Decoding be prepared using Modular Adding, Rotational Shift operation and binary XNOR operation. The original message is stream of bits, & be presumed to be isolated into an amount of blocks having s bits in each of the them, where s be power of 3 (e.g. 3, 9, 27, 81, 243). An amount of 0’s be added at the MSB location of the stream for constructing whole numeral of bits odd in every block. For getting the cipher text the entire operation is done in two phases. In the first phase modular adding is done on neighboring blocks taking modulus of adding be 2s. The amount restores the subsequent block, 1st block remnants unmoved. At the time of summing up, carry turned beginning the MSB be rejected. In the next phase left and right bit rotation are applied on the output stream and logical XNOR was executed on the result to get the cipher text. The technique be employed on blocks with changeable dimensions from 3 to 3n. For decryption, the order of XNOR operation & rotational shift will be reversed and modular decryption will be adopted.


Encoding Decoding Secret message Block cipher Rotational cryptographic technique 


  1. 1.
    Guha, D., Chakraborty, R., Sinha, A.: A block cipher based cryptosystem through modified forward backward overlapped modulo arithmetic technique (MFBOMAT). Int. Organ. Sci. Res. J. Comput. Eng. (IOSRJCE) 13(1), 138–146 (2013). Article number 22. e-ISSN 2278-0661, p-ISSN 2278-8727Google Scholar
  2. 2.
    Chakraborty, R., Mandal, J.K.: A microprocessor-based stream cipher through stream parity technique (SPT). In: First International Conference on Computer, Communication, Control and Information Technology (C3IT 2009), 06–07 February 2009, Hoogly, West Bengal, India, Organized and Sponsored by Academy of Technology (AOT), IEEE Leos Calcutta Chapter, IEEE EDS Calcutta Chapter, All India Council for Technical Education (AICTE), Indian Space Research Organization (ISRO), and CSIR. Advanced Research Series, pp 417–423. Macmillan Publishers India Ltd., New Delhi (2009). ISBN 10: 0230-63759-0, ISBN 13: 978-0230-63759-7Google Scholar
  3. 3.
    Mandal, J.K., Chakraborty, R.: A microprocessor-based block cipher through rotational addition technique (RAT). In: Proceedings of 9th International Conference of IEEE on Information Technology, OTIS, ITER, NJIT SATYAM COMPUTER & IEEE (ICIT 2006), Bhubaneswar, India, 18–21 December 2006, pp. 155–159. IEEE Computer Society Conference Publishing Services (2006). ISBN-10: 0-7695-2635-7/06, ISBN-13: 978-0-7695-2635-5Google Scholar
  4. 4.
    Mandal, J.K., Sinha, S., Chakraborty, R.: A microprocessor-based block cipher through overlapped modulo arithmetic technique (OMAT). In: Proceedings of 12th International Conference of IEEE on Advanced Computing and Communications ADCOM-2004, 15–18 December, Ahmedabad, India, pp. 276–280 (2004)Google Scholar
  5. 5.
    Stallings, W.: Cryptography and Network Security: Principles and Practices, 4th edn. Prentice-Hall of India Private limited, New Delhi (2008)Google Scholar
  6. 6.
    Kahate, A.: Cryptography and Network Security, 2nd edn. TMH, New Delhi (2008)Google Scholar
  7. 7.
    Shaify, K., Meenakshi, M.: Performance evaluation of various symmetric encryption algorithms. In: Proceedings of International Conference of IEEE on Parallel, Distributed and Grid Computing, Solan, India, December 2014, pp. 11–13 (2014).

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Debajyoti Guha
    • 1
    Email author
  • Rajdeep Chakraborty
    • 2
  • J. K. Mandal
    • 3
  1. 1.Department of CSESiliguri Institute of TechnologySiliguriIndia
  2. 2.Department of CSENetaji Subhash Engineering CollegeKolkataIndia
  3. 3.Department of CSEUniversity of KalyaniKalyaniIndia

Personalised recommendations