Research Article

An Encryption Algorithm for Secure Data Transmission

by  Rohan Rayarikar, Sanket Upadhyay, Deeshen Shah
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 40 - Issue 7
Published: February 2012
Authors: Rohan Rayarikar, Sanket Upadhyay, Deeshen Shah
10.5120/4980-7238
PDF

Rohan Rayarikar, Sanket Upadhyay, Deeshen Shah . An Encryption Algorithm for Secure Data Transmission. International Journal of Computer Applications. 40, 7 (February 2012), 43-47. DOI=10.5120/4980-7238

                        @article{ 10.5120/4980-7238,
                        author  = { Rohan Rayarikar,Sanket Upadhyay,Deeshen Shah },
                        title   = { An Encryption Algorithm for Secure Data Transmission },
                        journal = { International Journal of Computer Applications },
                        year    = { 2012 },
                        volume  = { 40 },
                        number  = { 7 },
                        pages   = { 43-47 },
                        doi     = { 10.5120/4980-7238 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2012
                        %A Rohan Rayarikar
                        %A Sanket Upadhyay
                        %A Deeshen Shah
                        %T An Encryption Algorithm for Secure Data Transmission%T 
                        %J International Journal of Computer Applications
                        %V 40
                        %N 7
                        %P 43-47
                        %R 10.5120/4980-7238
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. We have proposed a new algorithm based on the concept used by Rijmen and Daemen (Rijndael algorithm), the founders of AES algorithm. The proposed algorithm encrypts and decrypts two 128 bits data simultaneously i.e. 256 bits data, thus providing strong encryption accompanied with complex processing. The proposed Feistal algorithm uses various invertible, self-invertible, and non-invertible components of modern encryption ciphers and key generation same as that of AES. This algorithm provides a secure, fast, and strong encryption of the data. There is a huge amount of confusion and diffusion of the data during encryption which makes it very difficult for an attacker to interpret the encryption pattern and the plain text form of the encrypted data. The proposed algorithm is also resistant to Brute-Force and pattern attacks.

References
  • <ul style="text-align: justify;"> Security
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Encryption Algorithm S-Box Substitution Complement Feistal ELT ERT EBT LPT and RPT

Powered by PhDFocusTM