A New Secret Key Cipher: C128

  • Indrajit Das
  • R. Saravanan
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (volume 167)


This paper describes a new secret key cryptosystem named CIPHER128 (C128). The algorithm is based on a feistel structure which encrypts a 128 bit block. It demonstrates few effective features like multiple S-Boxes, variable plain text size depending on data and key, padding by random variables, data and key dependent cyclic shift operations and variable length key.


Symmetric Key Cryptography S-Box Substitution Permutation Feistel Networks Confusion Diffusion Avalanche Effect 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Shannon, C.E.: Communication theory of secret systems. Bell Systems Technical Journal 28, 656–715 (1949) Google Scholar
  2. 2.
    Feistel, H.: Cryptography and Computer Privacy. Scientific American 228(5), 15–23 (1973) Google Scholar
  3. 3.
    Feistel, H., Notz, H.W., Lynn Smith, J.: Some cryptographic techniques for machine-to-machine data communications. IEEE Proceedings 63(11), 1545–1554 (1975) Google Scholar
  4. 4.
    Webster, A.F., Tavares, S.E.: On the Design of S-Boxes. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 523–534. Springer, Heidelberg (1986) Google Scholar
  5. 5.
    Evertse, J.-H.: Linear Structures in Block Ciphers. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 249–266. Springer, Heidelberg (1988)Google Scholar
  6. 6.
    Adams, C.M.: Constructing Symmetric Ciphers using Cast Design Procedure Google Scholar
  7. 7.
    Grossman, E., Tuckerman, B.: Analysis of a Feistel-like cipher weakened by having no rotating key. Technical Report RC 6375, IBM (1977) Google Scholar
  8. 8.
    Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991) Google Scholar
  9. 9.
    Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)Google Scholar
  10. 10.
    Rivest, R.L.: The RC5 Encryption Algorithm Google Scholar
  11. 11.
    Schneier, B.: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish) Google Scholar
  12. 12.
    Schneier, B.: Applied Cryptography. John Wiley & Sons, New York (1994) Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.SCSEVIT UniversityVelloreIndia
  2. 2.SITEVIT UniversityVelloreIndia

Personalised recommendations