Skip to main content

A Symmetrical Encryption Technique for Text Encryption Using Randomized Matrix Based Key Generation

  • Conference paper
  • First Online:
Advances in Data Science and Management

Abstract

At present huge amount of data are moving through internet, this creates a huge concern for the security of the data while it is being moved through unsecured medium like wireless internet. Among all data most commonly used data format is text data which even though being highly vulnerable to security breaches is used in essential areas like banking and database management. There are many methodologies proposed to secure this data but the possibility of data being exploited remains. The proposed system presents a new symmetric encryption technique where complexities of calculating determinants and developing random matrices are used to generate keys. The system consists of three phases, key generation, encryption and decryption. In the first phase keys are generated which are computed by calculating the determinants of decomposed matrices, these decomposed matrices are generated from the multiplication of the original random matrices. In the second phase a key is randomly selected and is added with the ASCII value of the text message. The new generated value is then multiplied with the multiplication factor which is decomposition of selected key into the range of zero to nine. In the last phase the encrypted text is reverted back to its original text by performing reverse operations performed during encryption phase i.e. division of ASCII value of encrypted text by multiplication factor and then subtraction of the value of key from the computed result. The performance of the system is measured by calculating the total time taken to generate key with encryption and decryption of the input text message. The proposed system has been compared with various existing robust systems like AES, DES and BLOWFISH. And from the comparison it can be asserted that the proposed system is more efficient than the existing systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. H. El-Hennaway, A.E.A Omar, S. Kholaif, LEA: link encryption algorithm proposed stream cipher algorithm. Ain Shams Eng. J. (2014)

    Google Scholar 

  2. B. Wang, Q. Wu, Y. Hu, A knapsack based probabilistic encryption scheme. On Line March (2007)

    Google Scholar 

  3. Performance analysis of encryption algorithms for information security, in International Conference on Circuits, Power and Computing Technologies (ICCPCT-2013) (2013)

    Google Scholar 

  4. evaluation of symmetric encryption algorithms for MANETs, in IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (2010)

    Google Scholar 

  5. The application of hybrid encryption algorithm in software security, in Fourth International Conference on Computational Intelligence and Communication Networks (CICN) (2012)

    Google Scholar 

  6. Efficient key management and cipher text generation using BCD coded parity bits, in 3rd International Conference on Recent Trends in Computing (ICRTC) (2015)

    Google Scholar 

  7. Performance evaluation of cryptographic algorithms: DES and AES, in IEEE Students’ Conference on Electrical, Electronics Computer Science

    Google Scholar 

  8. J.A. Davis. D.B. Holdridge. G.J. Simmons, Status report on factoring, in Proceedirigy of EurocrXpr ’84 (Lecture Notes in Computer Science 209) (Springer, Berlin, West Gcrmany, 1985

    Google Scholar 

  9. J. Supercunipur, T.R. Caron, R.D. Silverinan, Parallel implementation of the quadratic sieve. to be published

    Google Scholar 

  10. R. Berger, S. Kannan, R. Peralta, A framework for the study of cryptographic protocols, in Proceedings of Crypro ’85 (Lecture Notes in Computer Science 218) (Springer, Berlin, Germany, 1985), pp. 87–103

    Google Scholar 

  11. Fast evaluation of logarithms in finite fields with characteristic two, in IEEE Trtiris Theory, vol. IT-30 (1984)

    Google Scholar 

  12. G. Singh, A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int. J. Comput. Appl. (2013)

    Google Scholar 

  13. The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. (1994). Coppersmith

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pratik Gajanan Mante .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mante, P.G., Oswal, H.R., Swain, D., Deshpande, D. (2020). A Symmetrical Encryption Technique for Text Encryption Using Randomized Matrix Based Key Generation. In: Borah, S., Emilia Balas, V., Polkowski, Z. (eds) Advances in Data Science and Management. Lecture Notes on Data Engineering and Communications Technologies, vol 37. Springer, Singapore. https://doi.org/10.1007/978-981-15-0978-0_13

Download citation

Publish with us

Policies and ethics