Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2019, Cilt: 6 , 81 - 87, 25.07.2019

Öz

Kaynakça

  • D. Kahil, M. A. Lebdeh, M. S. E. Dine and A. E. Rafhi, "Innovation of a secured transmitter/ receiver chain by creating a new encryption algorithm," 2017 Sensors Networks Smart and Emerging Technologies (SENSET), Beirut, 2017, pp. 1-3. doi: 10.1109/SENSET.2017.8125037 D. H. Kurniawan and R. Munir, "Double Chaining Algorithm: A secure symmetric-key encryption algorithm," 2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), George Town, 2016, pp. 1-6. doi: 10.1109/ICAICTA.2016.7803097 Lewi, K., & Wu, D. J. (2016, October). Order-revealing encryption: New constructions, applications, and lower bounds. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1167-1178). ACM. Zhang, W., Lü, X., & Li, H. (2010). Efficient broadcast encryption scheme based on number theory research unit. Wuhan University Journal of Natural Sciences, 15(3), 247–250. https://doi.org/10.1007/s11859-010-0313-7 Negi, A., & Goyal, A. (2018). Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie-Hellman Approach in Cloud Computing. J. Choi and Y. Kim, "An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system," 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Jeju, 2016, pp. 1-4. Kumar, N. S., Lakshmi, G. R., & Balamurugan, B. (2015). Enhanced attribute based encryption for cloud computing. Procedia Computer Science, 46, 689-696. M. Xin, "A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System," 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Xi'an, 2015, pp. 62-65. doi: 10.1109/CyberC.2015.9 “Blowfish,” Blowfish on GitHub. Michael Gilfix, Jun-2018. https://gist.github.com/eigenein/a56ce4d572484a582e14

ParEncrypt: A Two-phased Encryption for Improved Security

Yıl 2019, Cilt: 6 , 81 - 87, 25.07.2019

Öz

The
idea of encrypting text is alluring still as it is the most convenient and
straightforward means to shuffle text so as to make it unintelligible to
unintended third parties. We design and develop a novel symmetric encryption
algorithm ParEncrypt that implements a cascaded structure of known encryption
approaches: It first employs Feistel cipher to scramble the plaintext, then
applies a further step of substitution implemented via left and right
parentheses into the intermediate output to finalize the encryption. This two-phased
encryption provides enhanced security with the cost of slower paced
performance. We provide performance comparison of our design with common
benchmark encryption algorithms and see that ParEncrypt outperforms all others
with respect to the level of security. Additionally, our scheme offers an
additional benefit as our special way of encryption provides a significant
level of compression.

Kaynakça

  • D. Kahil, M. A. Lebdeh, M. S. E. Dine and A. E. Rafhi, "Innovation of a secured transmitter/ receiver chain by creating a new encryption algorithm," 2017 Sensors Networks Smart and Emerging Technologies (SENSET), Beirut, 2017, pp. 1-3. doi: 10.1109/SENSET.2017.8125037 D. H. Kurniawan and R. Munir, "Double Chaining Algorithm: A secure symmetric-key encryption algorithm," 2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), George Town, 2016, pp. 1-6. doi: 10.1109/ICAICTA.2016.7803097 Lewi, K., & Wu, D. J. (2016, October). Order-revealing encryption: New constructions, applications, and lower bounds. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1167-1178). ACM. Zhang, W., Lü, X., & Li, H. (2010). Efficient broadcast encryption scheme based on number theory research unit. Wuhan University Journal of Natural Sciences, 15(3), 247–250. https://doi.org/10.1007/s11859-010-0313-7 Negi, A., & Goyal, A. (2018). Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie-Hellman Approach in Cloud Computing. J. Choi and Y. Kim, "An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system," 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Jeju, 2016, pp. 1-4. Kumar, N. S., Lakshmi, G. R., & Balamurugan, B. (2015). Enhanced attribute based encryption for cloud computing. Procedia Computer Science, 46, 689-696. M. Xin, "A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System," 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Xi'an, 2015, pp. 62-65. doi: 10.1109/CyberC.2015.9 “Blowfish,” Blowfish on GitHub. Michael Gilfix, Jun-2018. https://gist.github.com/eigenein/a56ce4d572484a582e14
Toplam 1 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Makaleler
Yazarlar

Haneya Khan

Asim Sıddıquı

Fariha Islam

Elham Hamıd

Ebru Celıkel Cankaya

Yayımlanma Tarihi 25 Temmuz 2019
Yayımlandığı Sayı Yıl 2019Cilt: 6

Kaynak Göster

APA Khan, H., Sıddıquı, A., Islam, F., Hamıd, E., vd. (2019). ParEncrypt: A Two-phased Encryption for Improved Security. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 6, 81-87.