Abstract
The increase in demand for information security has made cryptography a basic need for protecting data from unauthorized access. In this paper, a computationally inexpensive Enyo block cipher has been presented. This multi-layered algorithm provides a promising solution to safeguard user’s information. The cipher works on the same line as the Feistel-based network with the symmetric structure and operates on 8-bit ASCII characters. Using 6-bit custom encoding, a secret key generates 6-bit encrypted text. This cipher modeled using undemanding operations utilizes partitioned key-based encryption with unique mapping followed by various bitwise swaps, a shifted modulo encryption, and using a transposition matrix. The proposed cipher is highly customizable as per user demands and necessities that make it more dependent on user inputs. Enyo cipher is faster in encryption and decryption than the Playfair cipher and shows comparable performance with XOR encryption. Enyo cipher demonstrates good resistance to a brute-force attack. It is well suited for small-scale applications where the computational power is a bottleneck. A comparison is also made that shows the impact of the proposed cipher to commonly available classical ciphers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Osman M, Johansson A (2017) A comparison of encryption algorithms for protecting data passed through a URL. Dissertation
Katz J, Lindell Y (2015) Introduction to modern cryptography, 2nd edn. CRC Press, Boca Raton
Aumasson J-P (2018) Serious cryptography: a practical introduction to modern encryption. No Starch Press, USA
Thambiraja E, Ramesh G, Umarani R (2012) A survey on various most common encryption techniques. Int J Adv Res Comput Sci Softw Eng 226–233
Al Tamimi A-K (2006) Performance analysis of data encryption algorithms. IJSART 2(12)
Knudsen LR (1994) Practically secure Feistel ciphers. In: Anderson R (ed) Fast software encryption. FSE 1993. Lecture notes in computer science, vol 809. Springer, Berlin. https://doi.org/10.1007/3-540-58108-1_26
Sravan Kumar D, Suneetha CH, Chandrasekhar A (2011) A block cipher using rotation and logical XOR operations. IJCSI Int J Comput Sci Issues 8(6):1
Mishra A (2013) Enhancing security of Caesar cipher using different methods. Int J Res Eng Technol 2(9):327–332
NehaKhatri-Valmik M, Kshirsagar VK (2014) Blowfish algorithm. OSR J Comput Eng 16(2)
Schneier B, Kelsey J, Whiting D, Wagner D, Hall C, Ferguson N (1999) The Twofish Encryption Algorithm: A 128-Bit Block Cipher. New York City: John Wiley & Sons. ISBN 0-471-35381-7
Kaur N, Sodhi S (2016) Data encryption standard algorithm (DES) for secure data transmission. IJCA Proceedings on International Conference on Ad-vances in Emerging Technology ICAET 2016 (2):31–37, September 2016
Stalling W (2004) Network security essentials (applications and standards). Pearson Education, Fayetteville
Josefsson S (2006) The base16, base32, and base64 data encodings. RFC, 4648, 1–18
Ramanujam S, Karuppiah M (2011) Designing an algorithm with high Avalanche effect. Int J Comput Sci Netw Secur 11(1)
Berners-Lee T, Fielding R, Masinter L (2005) Uniform resource identifier (URI): generic syntax. https://tools.ietf.org/html/rfc3986
PyPi Enyo. https://pypi.org/project/enyo/. Last accessed 2020/10/24
Deepthi R (2017) A survey on playfair cipher and its variants. Int Res J Eng Technol 04(04)
Jain S, Chhibber N, Kandi S (2018) Cryptanalysis of mono-alphabetic substitution ciphers using genetic algorithms and simulated annealing. IARS Int Res J 08(01)
Hilton R (2012) Automated cryptanalysis of monoalphabetic substitution ciphers using stochastic optimization algorithms. Ph.D. thesis, Department of Computer Science and Engineering, University of Colorado, Denver
Siahaan APU (2016) Rail fence cryptography in securing information. Int J Sci Eng Res 7(7)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shukla, A., Tolani, M.K., Polley, D., Kalathil, A.T., Subhashini, N. (2021). Enyo: A Multistage Partition and Transposition Based Cipher. In: Sharma, H., Gupta, M.K., Tomar, G.S., Lipo, W. (eds) Communication and Intelligent Systems. Lecture Notes in Networks and Systems, vol 204. Springer, Singapore. https://doi.org/10.1007/978-981-16-1089-9_32
Download citation
DOI: https://doi.org/10.1007/978-981-16-1089-9_32
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1088-2
Online ISBN: 978-981-16-1089-9
eBook Packages: EngineeringEngineering (R0)