Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AINSC,volume 167))

  • 1242 Accesses

Abstract

This paper describes a new secret key cryptosystem named CIPHER128 (C128). The algorithm is based on a feistel structure which encrypts a 128 bit block. It demonstrates few effective features like multiple S-Boxes, variable plain text size depending on data and key, padding by random variables, data and key dependent cyclic shift operations and variable length key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shannon, C.E.: Communication theory of secret systems. Bell Systems Technical Journal 28, 656–715 (1949)

    Google Scholar 

  2. Feistel, H.: Cryptography and Computer Privacy. Scientific American 228(5), 15–23 (1973)

    Google Scholar 

  3. Feistel, H., Notz, H.W., Lynn Smith, J.: Some cryptographic techniques for machine-to-machine data communications. IEEE Proceedings 63(11), 1545–1554 (1975)

    Google Scholar 

  4. Webster, A.F., Tavares, S.E.: On the Design of S-Boxes. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 523–534. Springer, Heidelberg (1986)

    Google Scholar 

  5. Evertse, J.-H.: Linear Structures in Block Ciphers. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 249–266. Springer, Heidelberg (1988)

    Google Scholar 

  6. Adams, C.M.: Constructing Symmetric Ciphers using Cast Design Procedure

    Google Scholar 

  7. Grossman, E., Tuckerman, B.: Analysis of a Feistel-like cipher weakened by having no rotating key. Technical Report RC 6375, IBM (1977)

    Google Scholar 

  8. Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991)

    Google Scholar 

  9. Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)

    Google Scholar 

  10. Rivest, R.L.: The RC5 Encryption Algorithm

    Google Scholar 

  11. Schneier, B.: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)

    Google Scholar 

  12. Schneier, B.: Applied Cryptography. John Wiley & Sons, New York (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Indrajit Das .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this paper

Cite this paper

Das, I., Saravanan, R. (2012). A New Secret Key Cipher: C128. In: Wyld, D., Zizka, J., Nagamalai, D. (eds) Advances in Computer Science, Engineering & Applications. Advances in Intelligent Systems and Computing, vol 167. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30111-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30111-7_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30110-0

  • Online ISBN: 978-3-642-30111-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics