Skip to main content

Enyo: A Multistage Partition and Transposition Based Cipher

  • Conference paper
  • First Online:
Communication and Intelligent Systems

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 204))

  • 1070 Accesses

Abstract

The increase in demand for information security has made cryptography a basic need for protecting data from unauthorized access. In this paper, a computationally inexpensive Enyo block cipher has been presented. This multi-layered algorithm provides a promising solution to safeguard user’s information. The cipher works on the same line as the Feistel-based network with the symmetric structure and operates on 8-bit ASCII characters. Using 6-bit custom encoding, a secret key generates 6-bit encrypted text. This cipher modeled using undemanding operations utilizes partitioned key-based encryption with unique mapping followed by various bitwise swaps, a shifted modulo encryption, and using a transposition matrix. The proposed cipher is highly customizable as per user demands and necessities that make it more dependent on user inputs. Enyo cipher is faster in encryption and decryption than the Playfair cipher and shows comparable performance with XOR encryption. Enyo cipher demonstrates good resistance to a brute-force attack. It is well suited for small-scale applications where the computational power is a bottleneck. A comparison is also made that shows the impact of the proposed cipher to commonly available classical ciphers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Osman M, Johansson A (2017) A comparison of encryption algorithms for protecting data passed through a URL. Dissertation

    Google Scholar 

  2. Katz J, Lindell Y (2015) Introduction to modern cryptography, 2nd edn. CRC Press, Boca Raton

    Google Scholar 

  3. Aumasson J-P (2018) Serious cryptography: a practical introduction to modern encryption. No Starch Press, USA

    Google Scholar 

  4. Thambiraja E, Ramesh G, Umarani R (2012) A survey on various most common encryption techniques. Int J Adv Res Comput Sci Softw Eng 226–233

    Google Scholar 

  5. Al Tamimi A-K (2006) Performance analysis of data encryption algorithms. IJSART 2(12)

    Google Scholar 

  6. Knudsen LR (1994) Practically secure Feistel ciphers. In: Anderson R (ed) Fast software encryption. FSE 1993. Lecture notes in computer science, vol 809. Springer, Berlin. https://doi.org/10.1007/3-540-58108-1_26

  7. Sravan Kumar D, Suneetha CH, Chandrasekhar A (2011) A block cipher using rotation and logical XOR operations. IJCSI Int J Comput Sci Issues 8(6):1

    Google Scholar 

  8. Mishra A (2013) Enhancing security of Caesar cipher using different methods. Int J Res Eng Technol 2(9):327–332

    Google Scholar 

  9. NehaKhatri-Valmik M, Kshirsagar VK (2014) Blowfish algorithm. OSR J Comput Eng 16(2)

    Google Scholar 

  10. Schneier B, Kelsey J, Whiting D, Wagner D, Hall C, Ferguson N (1999) The Twofish Encryption Algorithm: A 128-Bit Block Cipher. New York City: John Wiley & Sons. ISBN 0-471-35381-7

    Google Scholar 

  11. Kaur N, Sodhi S (2016) Data encryption standard algorithm (DES) for secure data transmission. IJCA Proceedings on International Conference on Ad-vances in Emerging Technology ICAET 2016 (2):31–37, September 2016

    Google Scholar 

  12. Stalling W (2004) Network security essentials (applications and standards). Pearson Education, Fayetteville

    Google Scholar 

  13. Josefsson S (2006) The base16, base32, and base64 data encodings. RFC, 4648, 1–18

    Google Scholar 

  14. Ramanujam S, Karuppiah M (2011) Designing an algorithm with high Avalanche effect. Int J Comput Sci Netw Secur 11(1)

    Google Scholar 

  15. Berners-Lee T, Fielding R, Masinter L (2005) Uniform resource identifier (URI): generic syntax. https://tools.ietf.org/html/rfc3986

  16. PyPi Enyo. https://pypi.org/project/enyo/. Last accessed 2020/10/24

  17. Deepthi R (2017) A survey on playfair cipher and its variants. Int Res J Eng Technol 04(04)

    Google Scholar 

  18. Jain S, Chhibber N, Kandi S (2018) Cryptanalysis of mono-alphabetic substitution ciphers using genetic algorithms and simulated annealing. IARS Int Res J 08(01)

    Google Scholar 

  19. Hilton R (2012) Automated cryptanalysis of monoalphabetic substitution ciphers using stochastic optimization algorithms. Ph.D. thesis, Department of Computer Science and Engineering, University of Colorado, Denver

    Google Scholar 

  20. Siahaan APU (2016) Rail fence cryptography in securing information. Int J Sci Eng Res 7(7)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Subhashini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shukla, A., Tolani, M.K., Polley, D., Kalathil, A.T., Subhashini, N. (2021). Enyo: A Multistage Partition and Transposition Based Cipher. In: Sharma, H., Gupta, M.K., Tomar, G.S., Lipo, W. (eds) Communication and Intelligent Systems. Lecture Notes in Networks and Systems, vol 204. Springer, Singapore. https://doi.org/10.1007/978-981-16-1089-9_32

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-1089-9_32

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-1088-2

  • Online ISBN: 978-981-16-1089-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics