Research Article
BibTex RIS Cite
Year 2019, Volume: 6 , 81 - 87, 25.07.2019

Abstract

References

  • D. Kahil, M. A. Lebdeh, M. S. E. Dine and A. E. Rafhi, "Innovation of a secured transmitter/ receiver chain by creating a new encryption algorithm," 2017 Sensors Networks Smart and Emerging Technologies (SENSET), Beirut, 2017, pp. 1-3. doi: 10.1109/SENSET.2017.8125037 D. H. Kurniawan and R. Munir, "Double Chaining Algorithm: A secure symmetric-key encryption algorithm," 2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), George Town, 2016, pp. 1-6. doi: 10.1109/ICAICTA.2016.7803097 Lewi, K., & Wu, D. J. (2016, October). Order-revealing encryption: New constructions, applications, and lower bounds. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1167-1178). ACM. Zhang, W., Lü, X., & Li, H. (2010). Efficient broadcast encryption scheme based on number theory research unit. Wuhan University Journal of Natural Sciences, 15(3), 247–250. https://doi.org/10.1007/s11859-010-0313-7 Negi, A., & Goyal, A. (2018). Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie-Hellman Approach in Cloud Computing. J. Choi and Y. Kim, "An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system," 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Jeju, 2016, pp. 1-4. Kumar, N. S., Lakshmi, G. R., & Balamurugan, B. (2015). Enhanced attribute based encryption for cloud computing. Procedia Computer Science, 46, 689-696. M. Xin, "A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System," 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Xi'an, 2015, pp. 62-65. doi: 10.1109/CyberC.2015.9 “Blowfish,” Blowfish on GitHub. Michael Gilfix, Jun-2018. https://gist.github.com/eigenein/a56ce4d572484a582e14

ParEncrypt: A Two-phased Encryption for Improved Security

Year 2019, Volume: 6 , 81 - 87, 25.07.2019

Abstract

The
idea of encrypting text is alluring still as it is the most convenient and
straightforward means to shuffle text so as to make it unintelligible to
unintended third parties. We design and develop a novel symmetric encryption
algorithm ParEncrypt that implements a cascaded structure of known encryption
approaches: It first employs Feistel cipher to scramble the plaintext, then
applies a further step of substitution implemented via left and right
parentheses into the intermediate output to finalize the encryption. This two-phased
encryption provides enhanced security with the cost of slower paced
performance. We provide performance comparison of our design with common
benchmark encryption algorithms and see that ParEncrypt outperforms all others
with respect to the level of security. Additionally, our scheme offers an
additional benefit as our special way of encryption provides a significant
level of compression.

References

  • D. Kahil, M. A. Lebdeh, M. S. E. Dine and A. E. Rafhi, "Innovation of a secured transmitter/ receiver chain by creating a new encryption algorithm," 2017 Sensors Networks Smart and Emerging Technologies (SENSET), Beirut, 2017, pp. 1-3. doi: 10.1109/SENSET.2017.8125037 D. H. Kurniawan and R. Munir, "Double Chaining Algorithm: A secure symmetric-key encryption algorithm," 2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), George Town, 2016, pp. 1-6. doi: 10.1109/ICAICTA.2016.7803097 Lewi, K., & Wu, D. J. (2016, October). Order-revealing encryption: New constructions, applications, and lower bounds. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1167-1178). ACM. Zhang, W., Lü, X., & Li, H. (2010). Efficient broadcast encryption scheme based on number theory research unit. Wuhan University Journal of Natural Sciences, 15(3), 247–250. https://doi.org/10.1007/s11859-010-0313-7 Negi, A., & Goyal, A. (2018). Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie-Hellman Approach in Cloud Computing. J. Choi and Y. Kim, "An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system," 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Jeju, 2016, pp. 1-4. Kumar, N. S., Lakshmi, G. R., & Balamurugan, B. (2015). Enhanced attribute based encryption for cloud computing. Procedia Computer Science, 46, 689-696. M. Xin, "A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System," 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Xi'an, 2015, pp. 62-65. doi: 10.1109/CyberC.2015.9 “Blowfish,” Blowfish on GitHub. Michael Gilfix, Jun-2018. https://gist.github.com/eigenein/a56ce4d572484a582e14
There are 1 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Articles
Authors

Haneya Khan

Asim Sıddıquı

Fariha Islam

Elham Hamıd

Ebru Celıkel Cankaya

Publication Date July 25, 2019
Published in Issue Year 2019Volume: 6

Cite

APA Khan, H., Sıddıquı, A., Islam, F., Hamıd, E., et al. (2019). ParEncrypt: A Two-phased Encryption for Improved Security. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 6, 81-87.