Design and Development of Symmetric Cipher for Text Data

  • Aumreesh Kumar SaxenaEmail author
  • Vijay Bhandari
  • Aasif Hasan
  • Sitesh Kumar Sinha
  • Piyush Shukla
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 34)


Security of information is a prime concern in today’s world, and cryptography is one of the solutions. To enlarge the authenticity and confidentiality of the data, there is a continuous development in cryptography with higher efficiency. With this continuation, we propose 16-byte block cipher symmetric key cryptography algorithm which is suitable for various types and sizes of text data. The beauty of the proposed algorithm is the use of logical (XOR and circular shift) operation. Experiments are showing the proposed algorithm to be safe, effortless and hard to crack.


Cryptography Symmetric key Asymmetric key Security Encryption Decryption 


  1. 1.
    Burke, J., McDonald, J., Austin, T.: Architectural support for fast symmetric-key cryptography. In: Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’00), pp. 178–189. ACM, New York, USA (2000)Google Scholar
  2. 2.
    Lenstra, A.K., Verheul, E.R.: Selecting cryptographic key sizes. J. Cryptol. 14(4), 255–293 (2001) (Springer, New York)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Pointcheval, D.: Practical security in public-key cryptography. In: Proceedings of the 4th International Conference on Information Security and Cryptology, pp. 1–17. LNCS 2288, Springer, South Korea (2001)Google Scholar
  4. 4.
    Cook, D.L., Keromytis, A.D.: Conversion functions for symmetric key ciphers. J. Inf. Assur. Secur. 2(2006), 41–50 (2005)Google Scholar
  5. 5.
    Patrick, T.K.: One way functions and public key cryptography. Afr. J. Math. Comput. Sci. Res. 4(6), 213–216 (2011)Google Scholar
  6. 6.
    Kumar, D.S., Suneetha, C.H., Chandrasekh, A.: Encryption of data using elliptic curve over finite fields. Int. J. Distrib. Parallel Syst. (IJDPS) 3(1), 301–308 (2012)CrossRefGoogle Scholar
  7. 7.
    Kaushik, Al., Gupta, K.: Ask cipher for small amount of data. In: International Conference on Reliability Optimization and Information Technology (ICROIT), India, pp. 318–321 (2014)Google Scholar
  8. 8.
    Gomathi, S.: A cryptography using advanced substitution technique and symmetric key generating algorithm. In: IEEE 8th International Conference on Intelligent Systems and Control (ISCO), India, pp. 224–228 (2014)Google Scholar
  9. 9.
    Barman, S., Chattopadhyay, S.: Fingerprint based symmetric cryptography. In: IEEE International Conference on High Performance Computing and Applications (ICHPCA), India, pp. 1–6 (2014)Google Scholar
  10. 10.
    Chandraa, S., Mandalb, B., Alamc, Sk., Bhattacharyyad, S.: Content based double encryption algorithm using symmetric key cryptography. In: 3rd International Conference on Recent Trends in Computing (ICRTC-2015) Procedia Computer Science, vol. 57, pp. 1228–1234. Elsevier (2015)CrossRefGoogle Scholar
  11. 11.
    Anand, A., Raj, A., Kohli, R., Dr. Bibhu, V.: Proposed symmetric key cryptography algorithm for data security. In: International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH), India, pp. 159–162 (2016)Google Scholar
  12. 12.
    Dewangan, C.P., Agrawal, S.: A novel approach to improve avalanche effect of AES algorithm. Int. J. Adv. Res. Comput. Eng. Technol. 1(8), 248–252 (2012)Google Scholar
  13. 13.
    Landge, I., Contractor, B., Patel, A., Choudhary, R.: Image encryption and decryption using blowfish algorithm. In: National Conference on Emerging Trend in Information Technology NCETIT-2012, India, pp. 151–156 (2012) (World Journal of Science and Technology)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Aumreesh Kumar Saxena
    • 1
    Email author
  • Vijay Bhandari
    • 1
  • Aasif Hasan
    • 2
  • Sitesh Kumar Sinha
    • 3
  • Piyush Shukla
    • 4
  1. 1.SIRTS BhopalBhopalIndia
  2. 2.DUNew DelhiIndia
  3. 3.AISECTBhopalIndia
  4. 4.UIT RGPV BhopalBhopalIndia

Personalised recommendations