Encryption technique using dynamic table and block division process on binary field

In this paper a new cryptographic algorithm is proposed. Three Keys are used in this technique for encryption and decryption of data. The technique has generated an intermediate cipher which will be followed by unique random number card and block division process to produce final cipher. Composite and prime numbers are used to make the proposed algorithm more secure. Key-1 is a unique random number card and with this key an intermediate cipher text is produced. Key-2 has 5 digit random numbers. With the help of Key-2 block division process will be applied on Intermediate cipher and Key-3 will have random prime numbers which will be added to finalize the final cipher. With help of keys and following the reverse steps, plain text can be generated.

[1]  Md Rashedul Islam,et al.  An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography , 2014, 2014 International Conference on Informatics, Electronics & Vision (ICIEV).

[2]  V. Mahalakshmi,et al.  Modulation of hiding intensity by channel intensity - Stego by pixel commando , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[3]  J. K. Mandal,et al.  Key based bit level genetic cryptographic technique (KBGCT) , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[4]  Rengarajan Amirtharajan,et al.  A novel audio steg for secret communication , 2014, 2014 International Conference on Communication and Signal Processing.

[5]  Roman V. Yampolskiy,et al.  Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[6]  Magdy Saeb,et al.  An improved FPGA implementation of the modified hybrid hiding encryption algorithm (MHHEA) for data communication security , 2005, Design, Automation and Test in Europe.

[7]  N.A. Ismail,et al.  Secure perceptual data hiding technique using information theory , 2004, International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04..

[8]  M. Shirali-Shahreza,et al.  Text Steganography by Changing Words Spelling , 2008, 2008 10th International Conference on Advanced Communication Technology.

[9]  Cheng-Hsing Yang,et al.  Reversible VQ Data Hiding Based on Locally Adaptive Coding and Recursive Walking , 2009, 2009 2nd International Conference on Computer Science and its Applications.

[10]  Himanshu Gupta,et al.  ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION , 2011 .

[11]  Vinod Kumar Sharma,et al.  Multiphase Encryption: A New Concept in Modern Cryptography , 2013 .

[12]  Gundeep Singh Bindra Invisible Communication through Portable Document File (PDF) Format , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[13]  Mugurel Ionut Andreica,et al.  SCONeP: Steganography and Cryptography approach for UDP and ICMP , 2011, 2011 RoEduNet International Conference 10th Edition: Networking in Education and Research.

[14]  G A Sathish Kumar,et al.  A secure triple level encryption method using cryptography and steganography , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.

[15]  M. Shirali-Shahreza Pseudo-space Persian/Arabic text steganography , 2008, 2008 IEEE Symposium on Computers and Communications.

[16]  V. P. Binu,et al.  An effective private data storage and retrieval system using secret sharing scheme based on secure multi-party computation , 2014, 2014 International Conference on Data Science & Engineering (ICDSE).

[17]  B. M. Imran,et al.  An efficient steganographic technique based on chaotic maps and adpative PPM embedding , 2013, 2013 International Conference on Signal Processing , Image Processing & Pattern Recognition.

[18]  Subhranil Som,et al.  Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function , 2013 .

[19]  Nur Hadisukmana,et al.  Steganography Software with Combination of Encryption Algorithms for Multimedia Files , 2011, 2011 First International Conference on Informatics and Computational Intelligence.

[20]  Marjan Momtazpour,et al.  Cipher-text classification with data mining , 2010, 2010 IEEE 4th International Symposium on Advanced Networks and Telecommunication Systems.

[21]  S. Som,et al.  Session Key Based Manipulated Iteration Encryption Technique (SKBMIET) , 2008, 2008 International Conference on Advanced Computer Theory and Engineering.

[22]  Chaur-Chin Chen,et al.  A jigsaw puzzle based secret key exchange scheme , 2008, 2008 International Conference on Machine Learning and Cybernetics.

[23]  Wai Wai Zin,et al.  Implementation and analysis of three steganographic approaches , 2011, 2011 3rd International Conference on Computer Research and Development.

[24]  Marjan Momtazpour,et al.  Application of data mining in cryptanalysis , 2009, 2009 9th International Symposium on Communications and Information Technology.

[25]  Kuang Tsan Lin Based on Binary Encoding Methods and Visual Cryptography Schemes to Hide Data , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[26]  B. Murugeshwari,et al.  An Efficient Method for Knowledge Hiding Through Database Extension , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[27]  Poonam,et al.  An enhanced Least Significant Bit steganography method using midpoint circle approach , 2014, 2014 International Conference on Communication and Signal Processing.