Reverse Encryption Algorithm: A Technique for Encryption & Decryption

In the today's world, security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. Encryption of data is an important topic for research, as secure and efficient algorithms are needed that allow optimized encryption and decryption of data. In this paper we propose a new encryption algorithm, called Reverse Encryption Algorithm (REA). Our new encryption algorithm (REA) is simple and fast enough for most applications. REA encryption algorithm provides maximum security and limits the added time cost for encryption and decryption.

[1]  Mohey M. Hadhoud,et al.  Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types , 2010, Int. J. Netw. Secur..

[2]  K. M. S. Soyjaudah,et al.  Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security , 2009, Int. J. Netw. Secur..

[3]  Huy Hoang Ngo,et al.  Dynamic Key Cryptography and Applications , 2010, Int. J. Netw. Secur..

[4]  Sushil Jajodia,et al.  Implementation of a Storage Mechanism for Untrusted DBMSs , 2003, Second IEEE International Security in Storage Workshop.

[5]  Hakan Hacigümüs,et al.  Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.

[6]  Alberto Ceselli,et al.  Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.

[7]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[8]  Sehun Kim,et al.  Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases , 2009, IEICE Trans. Inf. Syst..

[9]  Hiroyuki Kitagawa,et al.  MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values , 2010, IEICE Trans. Inf. Syst..

[10]  Sushil Jajodia,et al.  Metadata Management in Outsourced Encrypted Databases , 2005, Secure Data Management.

[11]  Hakan Hacigümüs,et al.  Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model , 2003, DBSec.

[12]  Min Wang,et al.  Cryptography and relational database management systems , 2001, Proceedings 2001 International Database Engineering and Applications Symposium.

[13]  Dongyao Ji,et al.  Verifiable Attribute Based Encryption , 2010, Int. J. Netw. Secur..

[14]  Yuefei Zhu,et al.  New Efficient Searchable Encryption Schemes from Bilinear Pairings , 2010, Int. J. Netw. Secur..

[15]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[16]  J. P. Raina,et al.  Comparative Analysis of AES and RC4 Algorithms for Better Utilization , 2011 .

[17]  Vincent Rijmen,et al.  Rijndael, the advanced encryption standard , 2001 .

[18]  Bruce Schneier,et al.  Applied cryptography, second edition : protocols, algorithms,and source code in C , 2015 .