Skip to main content

A Rotation Based Encryption Technique Using Symmetric Key Method

  • Conference paper
  • First Online:

Abstract

With the increasing pace in science and technology, network security has become a great concern. The security demand of today’s world requires better encryption and decryption techniques at the root level. The techniques should be simple as well as inexpensive both in terms of time and space. In this paper, we have proposed a simple symmetric key algorithm. This algorithm requires the knowledge of some basic conversions, bitwise shifting operations and the folding method. The best part of this algorithm lies in the sharing of ciphered keys. The composition of two methods makes the algorithm highly efficient and stronger against various attacks like Brute Force attack, etc.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Alam, S.S., Bhattacharyya, S., Chandra, S.: A novel image encryption algorithm using hyper-chaos key sequences, multi step group based binary gray conversion and circular bit shifting logic. In: IEEE International Conference of Science Engineering and Management Research (ICSEMR) 2014, IEEE Xplore Digital Library, Print ISBN:978-1-4799-7614-0

    Google Scholar 

  2. Soltani, M.: A new secure cryptography algorithm based on symmetric key encryption. J. Basic Appl. Scient. Res. 3(7), 465–472 (2013). ISSN:2090-4304

    Google Scholar 

  3. www.webopedia.com/TERM/S/symmetric_key_cryptography.html

  4. www.algorithmic-solutions.info/leda_manual/symmetric_key_cryptography.html

  5. Chandra, S., Paira, S., Alam, Sk.S., Sanyal, G.: A comparative survey of symmetric and asymmetric key cryptography. In: IEEE International Conference on Electronics, Communication and Computational Engineering(ICECCE 2014), pp. 83–93 (2014)

    Google Scholar 

  6. mrajacse.files.wordpress.com/2012/01/applied-cryptography-2nd-ed-b-schneier.pdf

  7. Shyamala, C.K., Harini, N., Padmanabhan, T.R.: Cryptography and Security, 2nd edn. Wiley India Pvt. Ltd. (2012)

    Google Scholar 

  8. Forouzan, B.A.: Cryptography & Network Security, Special Indian Edition. Tata McGraw-Hill (2007)

    Google Scholar 

  9. Surya, E., Diviya, C.: A Survey on Symmetric Key Encryption Algorithm. Int. J. Comput. Sci. Commun. Netw. 2(4), 475–477

    Google Scholar 

  10. Mandal, B., Chandra, S., Alam, Sk.S., Sekhar Patra, S.: A comparative and analytical study on symmetric key cryptography. In: IEEE International Conference on Electronics, Communication and Computational Engineering (ICECCE 2014), pp. 131–136 (2014)

    Google Scholar 

  11. Chandra, S., Bhattacharyya, S., Paira, S., Alam, S.S.: A study and analysis on symmetric cryptography. In: IEEE International Conference of Science Engineering and Management Research (ICSEMR) 2014, IEEE Xplore Digital Library, Print ISBN:978-1-4799-7614-0

    Google Scholar 

  12. Kahate, A.: Cryptography and Network Security, 2nd edn. Tata McGraw-Hill (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Chandra, S., Paira, S., Alam, S.S., Bhattacharyya, S. (2015). A Rotation Based Encryption Technique Using Symmetric Key Method. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2550-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2550-8_3

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2549-2

  • Online ISBN: 978-81-322-2550-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics