IUP Publications Online
Home About IUP Magazines Journals Books Archives
     
Recommend    |    Subscriber Services    |    Feedback    |     Subscribe Online
 
The IUP Journal of Information Technology
A Newly Established Symmetric Key Encryption Algorithm for Small Amount of Data
:
:
:
:
:
:
:
:
:
 
 
 
 
 
 

During data transmission between the source and the destination in a computer network, the data is exposed to external modifications with malicious intentions. Cryptography is widely used to protect sensitive data from unauthorized access and modifications while on transit. There are various forms of cryptographic algorithms used in computer communications and are broadly divided into two types—symmetric key and asymmetric key. Symmetric key algorithms are the quickest and most commonly used type of encryption like Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), Advanced Encryption Standard (AES), etc. In symmetric key algorithms, a single key is used for both encryption and decryption. In this paper, a new symmetric key algorithm is proposed. The advantages of this new algorithm are also explained.

 
 

Human beings are always suspicious when you send a message to someone; you always suspect that someone else will intercept it and read it or modify it before re-sending. The World Wide Web and Internet has a great impact on our life. The Internet has created several security problems. Confidentiality and authentication are needed. Network security is a set of protocols that allow us to use the services effectively without worrying about security attacks (Atul, 2003; William, 2006; and 2008).

Cryptography is the science of encrypting and decrypting information. It first originated in 2000 BC at Egypt, where hieroglyphs were used to decorate the tombs of dead rulers and kings, which narrated a story of the life of the king and talked about the great acts of his life. They were deliberately cryptic, but not intended to hide text (http://all.net/edu/curr/ip/Chap2-1.html; and Behrouz, 2007). The Chinese did not use cryptography very much. However, it was widespread and quite advanced in India, where the government used to communicate with the spies. The famous Greek drama Bellerophon refers to the usage of cryptography, which was used when Bellerophon was sent to the king with a secret tablet. Julius Caesar developed a good method known as Caesar Cipher. Leon Battista Alberti is known as the father of ‘Western Cryptography’, while James Lovell is considered as the father of ‘American Cryptography’ (http:// web.itu.edu.tr/~orssi/dersler/cryptography/Chap2-1.pdf). Later Thomas Jefferson invented ‘Wheel Cipher’. Cryptography was also used in World War-I and II. The German Enigma Machine was developed by Arthur Scherbius, and the Japanese developed the Purple Machine (Behrouz, 2007).

In the 1970s, Dr. Horst Feistel established the precursor to what we call today Data Encryption Standard (DES). He came up with a family of ciphers called ‘Feistel Ciphers’ during his work tenure with IBM. In 1976, National Security Agency (NSA) worked with Feistel Cipher to establish FIPS PUB-46, known today as DES. Presently, Triple DES is playing the key role for providing a better security standard. The two colleagues of Feistel, Whitefield Diffie and Martin Hellman, first introduced the idea of Public Key Cryptography in a publication entitled “New Directions in Cryptography” (www.jgrcs.info/index.php/jgrcs/article/download/16/16). Today’s software industry uses Pretty Good Privacy (PGP), which was first introduced by Phil Zimmerman. In 1977, Ronald L Rivest, Adi Shamir, and Leonard M. Adleman developed a new Public key Algorithm, RSA. In the mid-1980s, ROT 13 was employed by USENET groups to prevent the viewing of “objectionable material by innocent eyes”. In 1990, a new algorithm with 128-bit, which acts as a replacement to DES algorithm, known as International Data Encryption Algorithm (IDEA) was developed by Xuejia Lai and James Massey. This algorithm effectively works for business and households. In 1991, Phil Zimmerman released the first version of PGP, a freeware product. In 1994, Ron Rivest published a new algorithm RC5, which is stronger than DES. In December 2001, National Institute of Science of Technology (NIST) published a symmetric-key block cipher known as “Advanced Encryption Standard (AES)” (Gary, 2012; and Andrew, 2003). In this paper, we present a new symmetric key algorithm.

 
 

Information Technology Journal, Cryptography, Symmetric key, Data Encryption Standard (DES), Advanced Encryption Standard (AES), Confidentiality, International Data Encryption Algorithm (IDEA), Integrity.