• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2023, Volume: 16, Issue: 4, Pages: 292-298

Original Article

ERN Cryptosystem for the Security of Textual Data based on Modified Classical Encryption Techniques

Received Date:11 October 2022, Accepted Date:22 December 2022, Published Date:03 February 2023

Abstract

Objectives: To develop an algorithm based on classical encryption techniques that cannot be cryptanalyzed easily. Methods: We have proposed a new hybrid approach for the encryption and decryption of data. In this technique, some bits from the plain text, after converting it into binary form, are deleted and permuted in another place and placed back in the text. Findings: We examine the encryption and decryption times of various plaintexts of different sizes. Here, we compare the proposed ERN (Ekta Ritu and Niram) Cryptosystem with the algorithm based on 2’s complement method based on time complexity and efficiency. Novelty: A table displaying the encryption and decryption times of several input files of various sizes for the proposed algorithm and the already existing algorithm is given, with a relevant graph, proves the novelty of the cryptosystem. The experimental results show that the ERN cryptosystem has better performance and efficiency than the algorithm based on 2’s complement method. Keywords: Cryptography; Data Security; Substitution; Transposition; Cipher Text

References

  1. Bhargava U, Sharma A, Chawla R, Thakral P. A new algorithm combining substitution & transposition cipher techniques for secure communication. 2017 International Conference on Trends in Electronics and Informatics (ICEI). 2017. Available from: https://doi.org/10.1109/ICOEI.2017.8300777
  2. Stallings W. Cryptography and Network Security Principles and Practices. Pearson/Prentice Hall. 2009.
  3. Majumder R, Datta S, Roy M. An Enhanced Cryptosystem Based on Modified Classical Ciphers. 8th International Conference on Advanced Computing and Communication Systems (ICACCS). 2022;p. 692–696. Available from: https://doi.org/10.1109/ICACCS54159.2022.9785033
  4. Masud KI, Hasan MR, Hoque MM, Nath UD, Rahman MO. A New Approach of Cryptography for Data Encryption and Decryption. 5th International Conference on Computing and Informatics (ICCI). 2022;p. 234–239. Available from: https://doi.org/10.1109/ICCI54321.2022.9756078
  5. Qadir AM, Varol N. A Review Paper on Cryptography. 7th International Symposium on Digital Forensics and Security (ISDFS). 2019. Available from: https://doi.org/10.1109/ISDFS.2019.8757514
  6. Jain A, Dedhia R, Patil A. Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication. International Journal of Computer Applications. 2015;129(13):6–11. Available from: https://doi.org/10.48550/arXiv.1512.05483
  7. Lubis FI, Simbolon HFS, Batubara TP, Sembiring RW. Combination of Caesar Cipher Modification with Transposition Cipher. Advances in Science, Technology and Engineering Systems Journal. 2017;2(5):22–25. Available from: https://doi.org/10.25046/aj020504
  8. Renuka K, Harshini GN. Analysis and Comparison of Substitution and Transposition Cipher. IJRAR- International Journal of Research and Analytical Reviews. 2019;6(2):549–555. Available from: http://ijrar.com/upload_issue/ijrar_issue_20543567.pdf
  9. Brezočnik L, Fister I, Podgorelec V. Nature-Inspired Cryptoanalysis Methods for Breaking Vigenère Cipher. In: New Technologies, Development and Application III. (pp. 446-453) Springer International Publishing. 2020.

Copyright

© 2023 Narwal et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)

DON'T MISS OUT!

Subscribe now for latest articles and news.