With the globalization the computing systems have become more prone to security related threats thus development of robust technique in field of cryptography has become essential. Security in IP routing is excessively important for the modern times towards secured transmission of messages. Symmetric cryptography could be a sustainable solution towards trespassing of communication and misuses of information. A cryptographic algorithm is considered to be computationally secure if it cannot be broken with standard resources either in present or in future. At the time of designing that has to be kept in mind the algorithm must be robust in nature especially when it is executing on the lap of the IP-Routing environment. We introduce the QR-Crypt block cipher cryptography technique. QR-Crypts has new features and encryption takes place at dual level of across the string as well as across the cipher image. Thus, QR-Crypt technique makes any system doubly secured. The algorithm can be implemented in higher level language and MATLAB can be used for image generation & image reading. We have tried to generate a new protocol based on QR decomposition of any matrix for encryption phase and getting back original matrix after multiplying matrices Q & R (which is obtained from cipher image). This technique can make the IP routing environment security to a greater level.
[1]
Eric S. Crawley,et al.
A Framework for QoS-based Routing in the Internet
,
1998,
RFC.
[2]
David D. Clark,et al.
Policy routing in Internet protocols
,
1989,
RFC.
[3]
Joan Daemen,et al.
AES Proposal : Rijndael
,
1998
.
[4]
Alfred Menezes,et al.
Handbook of Applied Cryptography
,
2018
.
[5]
Sergey Panasenko,et al.
On Use of Lightweight Cryptography in Routing Protocols
,
2012
.
[6]
Mitsuru Matsui,et al.
Linear Cryptanalysis Method for DES Cipher
,
1994,
EUROCRYPT.
[7]
It Informatics,et al.
Border Gateway Protocol
,
2013
.
[8]
Yakov Rekhter,et al.
A Border Gateway Protocol 4 (BGP-4)
,
1994,
RFC.
[9]
Audra E. Kosh,et al.
Linear Algebra and its Applications
,
1992
.
[10]
Mamta Kaparia,et al.
The Basics of Cryptography
,
2013
.
[11]
William Stallings,et al.
Cryptography and network security
,
1998
.
[12]
Daniel O. Awduche,et al.
Requirements for Traffic Engineering Over MPLS
,
1999,
RFC.
[13]
Giuseppe Di Battista,et al.
26 Computer Networks
,
2004
.