Bit Level Encryption Algorithm -- Implementation of Bit-Wise Operations and Randomized Bit-Wise Columnar Transposition Method | IEEE Conference Publication | IEEE Xplore

Bit Level Encryption Algorithm -- Implementation of Bit-Wise Operations and Randomized Bit-Wise Columnar Transposition Method


Abstract:

In the present paper the authors have introduced a new symmetric key cryptographic method which is based on several bit level operations on any plain text file. Nath et a...Show More

Abstract:

In the present paper the authors have introduced a new symmetric key cryptographic method which is based on several bit level operations on any plain text file. Nath et al already developed Bit Level Encryption Standard ver-1, 2, 3, Bit level Multi way Feedback encryption standard. Recently Nath et al also developed 2-dimensional and 3-dimensional multiway feedback encryption standard. In the present study the authors have three ways simultaneous feedback method applied along three dimensions on plain text. Nath et al already developed 3dMWFES ver-1 where they have used encryption methods in both x-axis and y-axis wise in different frames. In the present method the authors have introduced few simple bit-level operations in random order. Initially the entire plain text file is converted into bits and then using random key generator method (MSA) all bits were substituted in a two dimensional matrix. The size of the matrix will be calculated from user entered secret key-string. After entering bits in a matrix some bit-wise operations were applied such as bit-wise complement in some random places and after that bit-wise x-or and finally the columns are reshuffled in a random order to make the whole system complex. The same procedure applied multiple times. The number of encryption times is calculated using the method described in MSA algorithm proposed by Nath et al in 2010. The present method tested on various standard plain text files and the result shows that present method is free from standard cryptographic attack such as known plain text attack, brute force attack, differential attack, statistical attack. As the entire encryption method is based on bit levels so it is very much sensitive on input pattern. The present method may be applied in sensor networks, defense, any corporate sectors etc.
Date of Conference: 12-14 December 2015
Date Added to IEEE Xplore: 18 August 2016
ISBN Information:
Electronic ISSN: 2472-7555
Conference Location: Jabalpur, India

Contact IEEE to Subscribe

References

References is not available for this document.