Abstract
In this article a new Cryptographic System based on Block Cipher has been planned where the Encryption and Decryption are done based on Modular Arithmetic. Hence the title of the article is suggested as Modular Encryption and Decryption Technique (MEDT). The plain text message which is a stream of bits, is assumed to be separated into a number of blocks & each block contains m bits, where m is anyone of (3, 9, 27, 81, 243). Number of zeros will be appended at the MSB of bit stream to make total number of bits odd in each block. The binary addition has been made on contiguous blocks taking modulus of addition as 2m. The sum replaces the second block, first block remains unaltered. Similar operation will be continued for second and third blocks and so on till all the blocks are exhausted to get the cipher text. During summation the carry generated (if any) out of the MSB is discarded. The technique is applied on blocks with varying sizes from 3 to 3n. The modulo subtraction technique is adopted for decryption to get back the plain text.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Guha, D., Basu, A.: An odd even block cipher based cryptosystem through modulo arithmetic technique (OEMAT). Int. J. Res. Eng. Technol. (IJRET) 2(11), 138–146 (2013). e-ISSN 2319-1163, p-ISSN 2321-7308
Guha, D., Chakraborty, R., Sinha, A.: A block cipher based cryptosystem through modified forward backward overlapped modulo arithmetic technique (MFBOMAT). Int. Organ. Sci. Res. J. Comput. Eng. (IOSRJCE) 13(1), 138–146 (2013). Article number 22, e-ISSN 2278-0661, p-ISSN 2278-8727
Chakraborty, R., Guha, D., Mandal, J.K.: A block cipher based cryptosystem through forward backward overlapped modulo arithmetic technique (FBOMAT). Int. J. Eng. Sci. Res. J. (IJESR) 2(5), 349–360 (2012). Article number 7, ISSN 2277-2685
Mandal, J.K., Sinha, S., Chakraborty, R.: A microprocessor-based block cipher through overlapped modulo arithmetic technique (OMAT). In: Proceedings of 12th International Conference of IEEE on Advanced Computing and Communications ADCOM-2004, 15–18 December, Ahmedabad, India, pp. 276–280 (2004)
Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn. Prentice Hall, Upper Saddle River (2003)
Kahate, A.: Cryptography and Network Security, 2nd edn. TMH, India (2009)
Forouzan, B.: Cryptography and Network Security, 4th edn. TMH, India (2010)
Cole, E.: Hiding in Plain Text. Wiley, Hoboken (2003)
Pachghare, V.K.: Cryptography and Information Security. Prentice-hall of India Pvt. Ltd, Delhi
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Guha, D., Chakraborty, R., Mandal, J.K. (2018). An Approach Towards Design and Analysis of a New Block Cipher Based Cryptographic System Using Modular Encryption and Decryption Technique (MEDT). In: Mandal, J., Sinha, D. (eds) Social Transformation – Digital Way. CSI 2018. Communications in Computer and Information Science, vol 836. Springer, Singapore. https://doi.org/10.1007/978-981-13-1343-1_48
Download citation
DOI: https://doi.org/10.1007/978-981-13-1343-1_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1342-4
Online ISBN: 978-981-13-1343-1
eBook Packages: Computer ScienceComputer Science (R0)