Modified PCT on Variable Cipher Block Chaining Mode

  • Manas Paul
  • Jyotsana Kumar Mandal
  • Moirangthem Marjit Singh
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 340)


Permutative Cipher Technique (PCT), a session based symmetric key cryptographic technique was proposed by the authors in February 2008 [1]. In this paper, PCT is implemented on CBC mode of operation with variable block length (VCBC mode) where initialization vector IV is of variable length. The comparative study of the technique PCT with and without VCBC mode has done on twenty files each of four different file types (.dll, .doc, .exe and .txt) with file sizes varying from 1 kB to 6.3 MB (approx.). Results are generated for comparison of PCT with and without VCBC mode with respect to encryption and decryption times, character frequencies, Chi-square values, Avalanche and Strict Avalanche values, Bit Independence values.


PCT Session based symmetric key VCBC mode Avalanche Strict avalanche Bit independence Chi-square 


  1. 1.
    Paul, M., Mandal, J.K.: A permutative cipher technique (PCT) to enhance the security of network based transmission. In: 2nd national conference on computing for nation development, New Delhi, India, pp. 197-202, 8–9 Feb 2008Google Scholar
  2. 2.
    Abiachi, A.M.A., Ahmad, F., Ruhana, K.: A Competitive study of cryptography techniques over block cipher. In: 13th international conference on computer modeling and simulation (UKSim 2011), Cambridge, England, pp. 415–419, 30 Mar–01 April 2011Google Scholar
  3. 3.
    Navin, A.H., Oskuei, A.R., Khashandarag, A.S., Mirnia, M.: A novel approach cryptography by using residue number system. In: 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2011), Seogwipo, South Korea, pp. 636–639, 29 Nov–01 Dec 2011Google Scholar
  4. 4.
    Niemiec, M., Machowski, L.: A new symmetric block cipher based on key-dependent S-boxes. In: 4th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2012), St. Petersburg, Russia, pp. 474–478, 3–5 Oct 2012Google Scholar
  5. 5.
    Bhadra, G., Baia, T., Banik, S., Nath, A., Nath, J.: Bit level encryption standard (BLES): version-II. In: 2nd World Congress on Information and Communacation Technologies (WICT 2012), Trivandrum, Kerala, India, pp. 121–127, 30 Oct –02 Nov 2012Google Scholar
  6. 6.
    Verma, H.K., Singh, R.K.: Enhancement of RC6 block cipher algorithm and comparison with RC5 & RC6. In: 3rd IEEE international advance computing conference (IACC 2013), Ghaziabad, Uttar Pradesh, India, pp. 556–561, 22–23 Feb 2013Google Scholar
  7. 7.
    Ramesh, A., Suruliandi, A.: Performance analysis of encryption algorithms for information security. In: International Conference on Circuits, Power and Computing Technologies (ICCPCT 2013), Nagercoil, Tamil Nadu, India, pp. 840–844, 20–21 Mar 2013Google Scholar
  8. 8.
    Mandal, B.K., Bhattacharyya, D., Bandyopadhyay, S.K.: Designing and performance analysis of a proposed symmetric cryptography algorithm. In: International Conference on Communication Systems and Network Technologies (CSNT 2013), Gwalior, India, pp. 453–461, 6–8 April 2013Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • Manas Paul
    • 1
  • Jyotsana Kumar Mandal
    • 2
  • Moirangthem Marjit Singh
    • 3
  1. 1.Department of Computer ApplicationJIS College of EngineeringKalyaniIndia
  2. 2.Department of Computer Science and EngineeringKalyani UniversityKalyaniIndia
  3. 3.Department of Computer Science and EngineeringNorth Eastern Regional Institute of Science & Technology(NERIST)NirjuliIndia

Personalised recommendations