Skip to main content

CipherBit192: Encryption Technique for Securing Data

  • Conference paper
  • First Online:
Applied Computing and Information Technology (ACIT 2018)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 788))

  • 389 Accesses

Abstract

Cryptography is an important component in securing and protecting sensitive and confidential data. It is a technique of encrypting data, hiding the process and produced a ciphered text. The Data Encryption Standard (DES) algorithm is considerably known for its branded encryption/decryption technique. To explore the advantage of its recognized cycle process and ciphertext representation. This paper presents the new algorithm based on mixed technique by substituting reverse scheme, swapping and bit-manipulation. This encryption technique is a concept that combines selected cryptographic technique that can reduce and save time processing encryption operation, offers simplicity, and extended mixed encryption key generation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. History of Encryption. SANS Institute of InfoSec Reading Room. Copyright SANS Institute. https://www.sans.org/reading-room/whitepapers/vpns/history-encryption-730

  2. Rhee, M.Y.: Internet Security. Crytographic principles, algorithms, and protocols, p. 57

    Google Scholar 

  3. Data Encryption Standard. http://www.tutorialspoint.com

  4. Playfair Cipher. http://practicalcryptography.com/ciphers/playfair-cipher/#references

  5. Introduction to Blowfish. SplashID Safe Password Vault. http://www.splashdata.com/splashid/blowfish.htm

  6. Schneier, B.: The Blowfish Encryption Algorithm. https://www.schneier.com/cryptography/blowfish/

  7. BLOWFISHENC: Blowfish Encryption Algorithm. iitd.vlab.co.in

  8. Internet Security, Chap. 4 [ppt] slide 45–46

    Google Scholar 

  9. Xijun LI, A Summary of Bit Manipulation. https://xijunlee.github.io/2017/04/01/efficiently/

  10. Bansal, S., Shrivasta, R.: The IUP Journal of Computer sciences, vol. V, no. 4 (2011)

    Google Scholar 

  11. Bhagat, P., Satpute, K., Palekar, V.: Reverse encryption algorithm: a technique for encryption & decryption. Int. J. Latest Trends Eng. Technol. (IJLTET) 2(1), 91 (2013)

    Google Scholar 

  12. Lee, S., Park, T., Lee, D., Nam, T., Kim, S.: Chaotic order preserving encryption for efficient and secure queries on databases. IEICE Trans. Inf. Syst. 92, 207–217 (2009)

    Google Scholar 

  13. Ceselli, A., Damiani, E., Vimercati, S.D.C.D., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inf. Syst. Secur. 8(1), 119–152 (2005)

    Article  Google Scholar 

  14. Damiani, E., Di Vimercati, S.D.C., Finetti, M., Paraboschi, S., Samarati, P., Jajodia, S.: Implementation of a storage mechanism for untrusted DBMSs. In: IEE Security in Storage Workshop 2003, pp. 38–46 (2003)

    Google Scholar 

  15. Hacigümüş, H., Iyer, B., Mehrotra, S.: Ensuring the integrity of encrypted databases in the database-as-a-service model. In: DBSec 17th Annual Working Conference on Data and Application Security, Kluwer, pp. 61–74 (2003)

    Google Scholar 

  16. Tang, Q., Ji, D.: Verifiable attribute based encryption. Int. J. Netw. Secur. 10(2), 114–120 (2010)

    MathSciNet  Google Scholar 

  17. Kumar, Y., Joshi, R., Mandavi, T., Bharti, S., Rathour, R.: Enhancing the security of data using DES algorithm along with substitution technique. Int. J. Eng. Comput. Sci. 5(10), 18395–18398 (2016). www.ijecs.in, ISSN 2319-7242

    Google Scholar 

  18. Jain, A., Dedia, R., Ppatil, A.: Enhancing the security of caesar cipher substitution method using a randomized approach for more secure communication. Int. J. Comput. Appl. 129(13), 6–11

    Google Scholar 

  19. Vyas, B., Vajpayee, A.: Local data security thought encryption. IJSART 2(8), 10–15 (2016)

    Google Scholar 

  20. Alanazi, H.O., Zaidan, B.B., Zaidan, A.A., Jalab, H.A., Shabbir, M., Al-Nabhani, Y.: New comparative study between DES, 3DES and AES within Nine factors. J. Comput. 2(3), 152–157 (2010)

    Google Scholar 

  21. Ebrahim, M., Khan, S., Khalid, U.B.: Symmetric algorithm survey: a comparative analysis. Int. J. Comput. Appl. 61(20), 12–19 (2013). https://arxiv.org/ftp/arxiv/papers/1405/1405.0398.pdf

    Google Scholar 

  22. Fathy, A., Tarrad, I.F., Hamed, H.F.A., Awad, A.I.: Advanced encryption standard algorithm: issues and implementation aspects. In: Hassanien, A.E., Salem, AB.M., Ramadan, R., Kim, T. (eds.) Advanced Machine Learning Technologies and Applications, AMLTA 2012. Communications in Computer and Information Science, vol 322. Springer, Heidelberg (2012)

    Google Scholar 

  23. Daemen, J., Rijmen, V.: The block cipher Rijndael. In: Smart Card Research and Applications. LNCS, vol. 1820, pp. 288–296. Springer

    Google Scholar 

  24. Pitchaiah, M., Daniel, P., Praveen: Implementation of advanced encryption standard algorithm. Int. J. Sci. Eng. Res. 3(3), 1–6 (2012). https://doi.org/10.15662/IJAREEIE.2016.0506068

    Article  Google Scholar 

  25. Katkade, P., Phade, G.M.: Application of AES algorithm for data security in serial communication. In: IEEE International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, August 2016

    Google Scholar 

  26. Binary Coded Decimal. ElectronicsTutorials. https://www.electronics-tutorials.ws/binary/binary-coded-decimal.html

Download references

Acknowledgment

This work (Grants No. C0515862) was supported by Business for Cooperative R&D between Industry, Academy, and Research Institute funded Korea Small and Medium Business Administration in 2017. Thank you to Bicol University, Technological Institute of the Philippines for the support given.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yungcheol Byun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Balilo, B.B., Gerardo, B.D., Byun, Y. (2019). CipherBit192: Encryption Technique for Securing Data. In: Lee, R. (eds) Applied Computing and Information Technology. ACIT 2018. Studies in Computational Intelligence, vol 788. Springer, Cham. https://doi.org/10.1007/978-3-319-98370-7_11

Download citation

Publish with us

Policies and ethics