# byte rotation algorithm

Post on 12-Apr-2017

85 views

Category:

## Engineering

Embed Size (px)

TRANSCRIPT

Smart Home Electricity Management System Using Cloud Computing

A new approach towards encryption schemes: Byte- Rotation encryption algorithm

Presented By: Jamal KhanContact: 00923219035609E-mail: engrjamalkhan0918@gmail.com

2/18/20171

Contents What is BREA?Previous used encryption algorithmsBREA AlgorithmSteps ExampleBREA with parallel encryption modelByte rotation with CBC encryption algorithmAdvantagesFuture enchancementConclusionRefrences 2/18/20172

What is BREA?Byte Rotation Encryption algorithm(BREA) (developed in 2012) is a symmetric key block cipher algorithm which is applied on different blocks of plaintext and executes in parallel manner through multithreading concept of single processor system.Multithreading is a technique at which a single set of code can be used by different processors at different stages of execution.2/18/20173

Previous used algorithmsEarlier many researchers have proposed various encryption algorithms such as AED,DES, Triple DES,RSA, Blowfish etc.Some of them are most popular in achieving data security at a great exent like AES and Blowfish.With increase in security level, the time and complexity of algorithm is also increased and this is the major cause of decreasing the speed and efficiency of encryption system.2/18/20174

2/18/20175BREA

Symmetric Key AlgorithmBlock Cipher Encryption

Byte Rotation Encryption Algorithm2/18/20176It is symmetric key block cipher algorithmEach block size of 16 bytesSize of Matrix is 16 bytesValue of matrix are randomly selected and are ranging from 1-26Mono alphabetic substitution concept is followedByte rotation technique is used

Steps2/18/20177The letters of the alphabet are assigned numerical values from 1 to 26 in sequence i.e. A,B,C,D,,Y,Z assigned numerical values 1,2,3,.26 respectively.The plaintext is partitioned into fixed-length blocks of size 16 bytes (128 bits) each. These blocks are represented by a matrix Mp. The values of key matrix (K) are randomly selected from the range 1 to 26. The size of key matrix is equivalent to the block size of plaintext i.e. 16 bytes. K=[K1,K2,K3,.K16]. Calculate the transpose matrix of plaintext block matrix (MP), which is denoted by (MP)T.

Continue2/18/201785. Calculate the encrypted key matrix Ke using the following formula: Ke = K mod 26. Add both the matrices MPT and Ke and the resultant matrix is denoted by CPK. CPK = MPT + Ke 7. Rotate the first three rows horizontally of CPK matrix such that rotate one byte from first row, rotate two bytes from second row, rotate three bytes from third row and fourth remains unchanged. The resultant matrix is denoted by Chr. 8. Rotate first three columns vertically of Chr matrix such that rotate one byte from first column, rotate two bytes from second column, rotate three bytes from third column and fourth column remains unchanged. The resultant matrix is denoted by CVR.

Continue .2/18/201799. Replace numeric values of CVR matrix by their corresponding letters and if 36 exist in CVR matrix, it is replaced by special character #. The resultant matrix is denoted by Ce.

EXPLANATION(1)2/18/201710

EXPLANATION(2)

2/18/201711

FLOWCHART2/18/201712

Byte rotation with CBC encryption algorithm2/18/201713

2/18/201714AdvantagesVery SecureRequire less computer resourcesNo complex calculationVery Fast

Future Enhancement2/18/201715The system can be easily modified to accept any encryption algorithm which would be framed in future. Moreover, currently concentration on the next work which adopts Parallelism through multiprocessor system where various encryption algorithms can run in parallel environment which enhances the performance and speed of Encryption/Decryption process.

Conclusion2/18/201716The concept of block wise parallel encryption using multithreading technique enhances the speed of encryption system. The system which use BREA provides enough security. Thus the system is justified for its use in securing files.

References2/18/201717[1] MAHENDRAN R BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM International Journal of Machine and Construction Engineering Volume 1 Issue 1 Aug 2014. [2] Nidhi Gouttam Implementation Of Simulation Of Byte Rotation Encryption Algorithm INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 5 ISSN 2347-4289 [3] Sunita Bhatti & Prof. S. K. Sharma, Block Wise Parallel Encryption through Multithreading Concept, Research Paper published in Aishwarya Research Communication Journal (ISSN: 0975-3613) Vol. 3, August 2011.

2/18/201718Thank You

Recommended