Abstract
In the present day to day life, due to the inconvenience of travelling from place to place, information/messages are sent through the internet. As a result it faces a lot of obstacles. The internet security techniques consist of various provisions and policies, which are adopted by the network administrator so as to prevent and monitor the unauthorized access, modification, misuse or denial of any network and its assets. In this paper, a new symmetric key cryptography algorithm has been developed, based on the principles of data structure and binary-gray conversion techniques. It has also implemented n-bit circular shift operation along with the folding logic. The technique is highly efficient to meet the necessary shortcomings for time and space. As a result, it provides more security against various attacks like the Man in the Middle attacks and Brute Force attack, etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alam, S.S., Bhattacharyya, S., Chandra, S.: A novel image encryption algorithm using hyper-chaos key sequences, multi step group based binary gray conversion and circular bit shifting logic. In: IEEE International Conference of Science Engineering and Management Research (ICSEMR) 2014, IEEE Xplore Digital Library, Print ISBN:978-1-4799-7614-0
Kahate, A.: Cryptography and Network Security, 2nd edn. Tata McGraw-Hill (2009)
Shyamala, C.K., Harini, N., Dr. Padmanabhan, T.R.: Cryptography and Security, 2nd edn. Wiley India Pvt. Ltd. (2012)
Chandra, S., Bhattacharyya, S., Paira, S., Alam, S.S.: A study and analysis on symmetric cryptography. In: IEEE International Conference of Science Engineering and Management Research (ICSEMR) 2014, IEEE Xplore Digital Library, Print ISBN:978-1-4799-7614-0
Mandal, B., Chandra, S., Alam, Sk.S., Sekhar Patra, S.: A comparative and analytical study on symmetric key cryptography. In: IEEE International Conference on Electronics, Communication and Computational Engineering (ICECCE 2014), pp. 131–136
Forouzan, B.A.: Cryptography & Network Security, Special Indian Edition. Tata McGraw-Hill (2007)
Surya, E., Diviya, C.: A survey on symmetric key encryption algorithm. Int. J. Comput. Sci. Commun. Netw. 2(4), 475–477
Soltani, M.: A New Secure Cryptography Algorithm Based on Symmetric Key Encryption. J. Basic Appl. Scient. Res. 3(7), 465–472 (2013). ISSN: 2090-4304
mrajacse.files.wordpress.com/2012/01/applied-cryptography-2nd-ed-b-schneier.pdf
Chandra, S., Paira, S., Alam, Sk.S., Sanyal, G.: A comparative survey of symmetric and asymmetric key cryptography. In: IEEE International Conference on Electronics, Communication and Computational Engineering (ICECCE 2014), pp. 83–93
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Paira, S., Chandra, S., Alam, S.S., Bhattacharyya, S. (2015). Symmetric Key Encryption Through Data Structure and Binary-Gray Conversion. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2550-8_1
Download citation
DOI: https://doi.org/10.1007/978-81-322-2550-8_1
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2549-2
Online ISBN: 978-81-322-2550-8
eBook Packages: EngineeringEngineering (R0)