Parallel Key Encryption for CBC And Interleaved CBC

In current day scenario, the need to protect information has become very important and hence the need for cryptographic algorithms is high. Here, we extend the parallel key encryption algorithm and bring out its full potential by implementing the various cryptographic modes such as cipher block chaining and interleaved cipher block chaining where commendable increase in efficiency and reduction in encryption and decryption time can be seen. We have also considerably increased the key size by using 1024 bit and 2048 bit keys for the algorithmic implementation and in CBC and interleaved CBC execution. Our practical analysis has brought to front the salient features of the parallel key encryption algorithm and its ability to provide enhanced data protection when using a larger key size along with its randomness property. In theoretical analysis, it can be shown that remarkable reduction in encryption and decryption time of cryptographic systems is achieved and an enhanced strength to the system against brute force attacks is achieved. Furthermore, PCA can be extended for different cryptographic modes, using varying key size and number of keys used in the process.

[1]  Moti Yung,et al.  Parallel Key-Insulated Public Key Encryption Without Random Oracles , 2007, Public Key Cryptography.

[2]  Chunyan Han,et al.  A Parallel Encryption Algorithm for Color Images Based on Lorenz Chaotic Sequences , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[3]  Dan Boneh,et al.  Cryptanalysis of RSA with private key d less than N0.292 , 2000, IEEE Trans. Inf. Theory.

[4]  Dan Boneh,et al.  TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .

[5]  D. Boneh Cryptanalysis of RSA with Private Key d Less Than N 0 , 1999 .

[6]  Behrouz A. Forouzan Introduction to cryptography and network security , 2008 .

[7]  T. N. Vijaykumar,et al.  Accelerating private-key cryptography via multithreading on symmetric multiprocessors , 2003, 2003 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS 2003..

[8]  Thongpon Teerakanok,et al.  Accelerating asymmetric-key cryptography using Parallel-key Cryptographic Algorithm (PCA) , 2009, 2009 6th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.

[9]  Marco Furini,et al.  International Journal of Computer and Applications , 2010 .

[10]  David Bishop Introduction To Cryptography With Java Applets , 2002 .