byte rotation encryption algorithm

14
BYTE ROTATION ENCRYPTION ALGORITHM Presented By:- SHIKHA JAIN M.Tech (CS)

Upload: shikha-jain

Post on 14-Apr-2017

440 views

Category:

Engineering


2 download

TRANSCRIPT

Page 1: Byte rotation encryption algorithm

BYTE ROTATION ENCRYPTION ALGORITHM

Presented By:-SHIKHA JAIN

M.Tech (CS)

Page 2: Byte rotation encryption algorithm

CONTENTSIntroductionWhat is BREA?BREA AlgorithmExampleBREA with ”Parallel Encryption Model”Byte Rotation with “CBC Encryption Algorithm”AdvantagesFuture EnhancementConclusionReferences

Page 3: Byte rotation encryption algorithm

What is BREA?

Byte Rotation Encryption Algorithm(BREA) (developed in 2012) is a Symmetric key Block Cipher Algorithm which is applied on different blocks of plaintext and executes in parallel manner through multithreading concept of single processor system.

Page 4: Byte rotation encryption algorithm

BREASymmetric Key Algorithm

Block Cipher Encryption

Page 5: Byte rotation encryption algorithm

BYTE ROTATION ENCRYPTION ALGORITHM

It is a Symmetric Key Block Cipher Algorithm.

Each block size is of 16 bytes.

Byte-Rotation technique is used.

Mono alphabetic substitution concept is followed.

Value of matrix are randomly selected and ranging from 1 to 26.

Size of matrix is 16 bytes.

Page 6: Byte rotation encryption algorithm

Example

R A Y MO N D SU I T IN G S 0

M=

18 15 21 141 14 9 725 4 20 1913 19 9 0

1 1 1 10 1 1 01 0 0 11 0 0 0

25 15 3 920 7 13 85 18 22 1721 12 26 24

18 1 25 1315 14 4 1921 9 20 914 7 19 0

19 16 22 151 15 10 726 4 20 2014 19 9 0

Cpk=K=Mp=

Ke=MpT=

RAYMONDSUITINGS

Ke =Kmod2Transpose matrix

Substitute numeric values of letters

Cpk=MpT + KeK=Random(1,26,16)

Page 7: Byte rotation encryption algorithm

Example

19 16 22 151 15 10 726 4 20 2014 19 9 0

Cpk=

16 22 15 1910 7 1 1520 26 4 2014 19 9 0

J Z I ST S O ON V A TP G D 0

10 26 9 1920 19 15 1514 22 1 2016 7 4 0

16 16 22 1510 15 10 720 4 20 2014 19 9 0

Cvr=Chr=

Ce=Chr=

The cipher texts block Ce and Key matrix K sends to

the recipient.

Page 8: Byte rotation encryption algorithm

BREA with “Parallel Encryption Model”

Page 9: Byte rotation encryption algorithm

Byte Rotation with “CBC Encryption Algorithm”

Cipher Block Chaining (CBC) uses feedback to feed the result of encryption back into the encryption of next block. The plain text is XOR’ed with the previous cipher text block before it is encrypted. The encryption of each block depends on all the previous blocks.

Block Cipher

Encryption

Block Cipher

Encryption

Cipher text

Key

Cipher text

Key

InitializationVector (IV)

PlaintextPlaintext

Page 10: Byte rotation encryption algorithm

Advantages

No complex calculations

Very fastRequire less computer resources

Very secure

Page 11: Byte rotation encryption algorithm

Future EnhancementThe system can be easily modified to accept any encryption algorithm which would be framed in future. Moreover, currently concentration on the next work which adopts Parallelism through multiprocessor system where various encryption algorithms can run in parallel environment which enhances the performance and speed of Encryption/Decryption process.

Page 12: Byte rotation encryption algorithm

Conclusion

The concept of block wise parallel encryption using multithreading technique enhances the speed of encryption system. The system which use “BREA” provides enough security. Thus the system is justified for its use in securing files.

Page 13: Byte rotation encryption algorithm

References[1] MAHENDRAN R “BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM” International Journal of Machine and Construction Engineering Volume 1 Issue 1 Aug 2014.

[2] Nidhi Gouttam “Implementation Of Simulation Of Byte Rotation Encryption Algorithm” INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 5 ISSN 2347-4289

[3] Sunita Bhatti & Prof. S. K. Sharma, “Block Wise Parallel Encryption through Multithreading Concept”, Research Paper published in Aishwarya Research Communication Journal (ISSN: 0975-3613) Vol. 3, August 2011

[4]W. Stallings, Cryptography and Network Security: Principles and Practice 3/e. Prentice Hall.

Page 14: Byte rotation encryption algorithm

THANK YOU