Encryption is widely used to ensure security in public networks like the internet. Any type of data has its own attribute; therefore, various algorithms should be used to protect confidential data from unauthorized access. Mostly the available encryption algorithms are used for text data. However, due to large data size and real time constrains, algorithms that are good for textual data. In this research, a block-based encryption model is proposed for information security using a combination of logical and mathematical operation. This model will be used as a pre-encryption technique to confuse the relationship between the original data and the generated ones. The generated data are then fed to the proposed encryption model. Efficiency, Avalanche Effect, and Execution Time have been used to measure the security level of the data. The experimental results have shown that the existing algorithms resulted in a lower efficiency, a higher execution time, and a more uniform efficiency. This implies a high similarity and a good quality of the retrieved data compared to the original one. Another feature of the proposed model is its generality; it can be applied with any other traditional algorithm to enhance its performance. Experimental results have shown that using the proposed model along with the other algorithms resulted in a better performance compared to using the other algorithms alone.
[1]
A Novel Key Generation for FMET
,
2011
.
[2]
Mustafa Rashid,et al.
Integrating Classical Encryption with Modern Technique
,
2010
.
[3]
S. Durga Bhavani,et al.
A Modified Playfair Cipher Involving Interweaving and Iteration
,
2009
.
[4]
K Poulose Jacob,et al.
Matrix based Key Generation to Enhance Key Avalanche in Advanced Encryption Standard
,
2011
.
[5]
Rajdeep Chakraborty,et al.
Triple SV: A Bit Level Symmetric Block-Cipher Having High Avalanche Effect
,
2011
.
[6]
S. Durga Bhavani,et al.
A Modified Hill Cipher Involving Interweaving and Iteration
,
2010,
Int. J. Netw. Secur..
[7]
Jyotsna Kumar Mandal,et al.
A Novel Generic Session Based Bit Level Cryptographic Technique to Enhance Information Security
,
2011
.
[8]
Bruce Schneier,et al.
Applied cryptography, second edition : protocols, algorithms,and source code in C
,
2015
.
[9]
Seokhie Hong,et al.
Differential Cryptanalysis of TEA and XTEA
,
2003,
ICISC.
[10]
Poonam Singh,et al.
Comparing Classical Encryption With Modern Techniques
,
2015
.
[11]
Monisha Sharma,et al.
Implementation and analysis of various symmetric cryptosystems
,
2010
.