Abstract
With the increasing pace in science and technology, network security has become a great concern. The security demand of today’s world requires better encryption and decryption techniques at the root level. The techniques should be simple as well as inexpensive both in terms of time and space. In this paper, we have proposed a simple symmetric key algorithm. This algorithm requires the knowledge of some basic conversions, bitwise shifting operations and the folding method. The best part of this algorithm lies in the sharing of ciphered keys. The composition of two methods makes the algorithm highly efficient and stronger against various attacks like Brute Force attack, etc.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alam, S.S., Bhattacharyya, S., Chandra, S.: A novel image encryption algorithm using hyper-chaos key sequences, multi step group based binary gray conversion and circular bit shifting logic. In: IEEE International Conference of Science Engineering and Management Research (ICSEMR) 2014, IEEE Xplore Digital Library, Print ISBN:978-1-4799-7614-0
Soltani, M.: A new secure cryptography algorithm based on symmetric key encryption. J. Basic Appl. Scient. Res. 3(7), 465–472 (2013). ISSN:2090-4304
www.algorithmic-solutions.info/leda_manual/symmetric_key_cryptography.html
Chandra, S., Paira, S., Alam, Sk.S., Sanyal, G.: A comparative survey of symmetric and asymmetric key cryptography. In: IEEE International Conference on Electronics, Communication and Computational Engineering(ICECCE 2014), pp. 83–93 (2014)
mrajacse.files.wordpress.com/2012/01/applied-cryptography-2nd-ed-b-schneier.pdf
Shyamala, C.K., Harini, N., Padmanabhan, T.R.: Cryptography and Security, 2nd edn. Wiley India Pvt. Ltd. (2012)
Forouzan, B.A.: Cryptography & Network Security, Special Indian Edition. Tata McGraw-Hill (2007)
Surya, E., Diviya, C.: A Survey on Symmetric Key Encryption Algorithm. Int. J. Comput. Sci. Commun. Netw. 2(4), 475–477
Mandal, B., Chandra, S., Alam, Sk.S., Sekhar Patra, S.: A comparative and analytical study on symmetric key cryptography. In: IEEE International Conference on Electronics, Communication and Computational Engineering (ICECCE 2014), pp. 131–136 (2014)
Chandra, S., Bhattacharyya, S., Paira, S., Alam, S.S.: A study and analysis on symmetric cryptography. In: IEEE International Conference of Science Engineering and Management Research (ICSEMR) 2014, IEEE Xplore Digital Library, Print ISBN:978-1-4799-7614-0
Kahate, A.: Cryptography and Network Security, 2nd edn. Tata McGraw-Hill (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Chandra, S., Paira, S., Alam, S.S., Bhattacharyya, S. (2015). A Rotation Based Encryption Technique Using Symmetric Key Method. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2550-8_3
Download citation
DOI: https://doi.org/10.1007/978-81-322-2550-8_3
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2549-2
Online ISBN: 978-81-322-2550-8
eBook Packages: EngineeringEngineering (R0)