NARSKCA: Novel and robust symmetric key cryptography algorithm

  • Authors

    • Balajee Maram Asst.Prof., Dept. of CSE, GMRIT, POST:RAJAM, ANDHRA PRADESH, INDIA
    • Y Ramesh Kumar Asso.Prof, Dept of CSE
    • K Lakshmana Rao
    2015-09-05
    https://doi.org/10.14419/ijsw.v3i2.5111
  • , DRDP, Symmetric Key Cryptography, Block Cipher, Lucas, Narskca.
  • In this research paper, a novel and strong symmetric key cryptography algorithm is proposed. NARSKCA is based on several symmetric cryptographic algorithms. NARSKCA is very simple that uses character converting algorithm, Fibonacci Number Series, Lucas Number series and bitwise XOR. In NARSKCA, 32 files are shared-secret files plays a vital role in this Proposed Algorithm. The Sub-keys are generated from those 32 shared-secret files which are useful in different rounds of Encryption and Decryption Process. The most important feature is the calculation of the final key from the Sub-Keys for each Text-Block. Key Generation, encryption/decryption schemes of NARSKCA are fast and difficult to predict by Cryptanalysts.

  • References

    1. [1] W. Diffie and M. Hellman, "New directions in cryptography", IEEE Transaction on Information Theory, 1976, pp. 644–654. http://dx.doi.org/10.1109/TIT.1976.1055638.

      [2] http://en.wikipedia.org/wiki/Communication.

      [3] "Data Encryption Standard," Federal Information Processing Standards Publication No. 46, National Bureau of Standards, January 15, 1977.

      [4] Prakash Kuppuswamy, Dr. Saeed Q Y Al-Khalidi, "Implementation of Security through Simple Symmetric Key Algorithm Based On Modulo 37", International Journal of Computers & Technology, ISSN: 2277-3061, Volume 3, OCT 2012.

      [5] Ayushi, "A Symmetric Key Cryptographic Algorithm" International Journal of Computer Applications (0975-8887), Volume 1, 2010.

      [6] Suyash Verma, Rajnish Choubey, Roopali Soni, "An Efficient Developed New Symmetric Key Cryptography Algorithm for Information Securityâ€, July 2012.

      [7] Monika Agarwal, Pradeep Mishra, "A Modified Approach for Symmetric Key ryptography Based On Blowfish Algorithm", August 2012.

      [8] http://protea.worldonline.co.za/fibon.htm.

      [9] http://milan.milanovic.org/ math /english/fibo/ fibo3.html.

      [10] A. Viji Amutha Mary, Dr. T. Jebarajan, A NovelData Perturbation Technique with higher Security, IJCET, 3(2): 126-132 (2012).

      [11] B. Santhi, K.S. Ravichandran, A.P. Arun and L. Chakkarapani "A Novel Cryptographic Key Generation Method Using Image Features", Research Journal of Information Technology 4(2): 88-92, 2012, ISSN: 2041-3114.

      [12] BALAJEE MARAM, Dr CHALLA NARASIMHAM, "Double Reflecting Data Perturbation Method for Information Security", OJCST, Dec' 2012, Vol: 5, No.2, Pgs: 283-288.

      [13] http://www.cse.unr.edu/~bebis/CS302/image_info.html.

  • Downloads

  • How to Cite

    Maram, B., Kumar, Y. R., & Rao, K. L. (2015). NARSKCA: Novel and robust symmetric key cryptography algorithm. International Journal of Scientific World, 3(2), 244-254. https://doi.org/10.14419/ijsw.v3i2.5111