High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Encrypted Security Technique by using Cubical Efficient Block Cipher Method

Author(s):

Anubhav Pandey , JNCT REWA; Pooja Singh, JNCT REWA; Sunil Singh, JNCT REWA; Satish Kumar Soni, RIT REWA

Keywords:

Encryption, Decryption, Block Cipher, DES, AESD, 3-DES, AES, Blowfish and Encryption

Abstract

Cryptography plays a vital role in information security. during digital exchange of information, this can be necessary technique; data should not be access by an unrecognized user. Cryptography schemes are rely on symmetric and asymmetric encoding. Researchers worked on secure and efficient information transmission and presented numerous crypto graphical techniques. For secure information broadcast over the network, it is needed to use correct encoding technique .Symmetric encryption is extensively used technique .During this article, we are representing an efficient block cipher encoding techniques depend upon cubical technique and improved key. Planned AESD technique is based on block level symmetric encoding. A combine of binary inputs are contains by every cell. The Cube will able to give a numerous variety of combinations, by that system can generate a powerful cipher text. For efficient and powerful cipher, proposed technique uses shuffling of bits in cube. Planned AESD rule, performed a series of bit transformations, by using of S -BOX, operation XOR, and operation AND. The performance analysis of projected encoding technique area unit compared with different existing symmetric encryptions ways, primarily based on block cipher encoding ,such as encoding normal, 3-Data encoding normal, Advance encoding standard, and blowfish fish, supported numerous comparison parameters like encoding and decoding time, Avalanche impact and cipher text size .Simulation results clearly shows that projected technique performs outstanding in terms of encoding and decoding time, Avalanche impact and size, as compared to existing strategies.

Other Details

Paper ID: IJSRDV7I50207
Published in: Volume : 7, Issue : 5
Publication Date: 01/08/2019
Page(s): 280-283

Article Preview

Download Article