An Established New Symmetric Key Cipher PDF
An Established New Symmetric Key Cipher PDF
An Established New Symmetric Key Cipher PDF
Submitted By:
Md. Anisur Rahman
MSCSE, CSE Department,
United International University
Submitted To:
Dr. Salekul Islam (SaIm)
Professor & Head of Department, CSE,
United International University.
Submission Date:
05/10/2020
This project is included in Network Security Course (CSE 6127).
Abstract
The main aim of my term paper is to establish a new traditional symmetric - key
cipher in security with cryptography. Traditional symmetric- key ciphers will be
introduced here using examples from cryptography. Symmetric- key ciphers are
not used today. But it plays important role in modern cipher. First, they are very
simple and easier to understand. Second, it is basic foundation of cryptography.
Third, it comes to provide rationale for using modern ciphers. Because the
cryptography said, traditional ciphers can be easily attacked using computer. So
we need a powerful symmetric-key cipher for cryptography. (Cryptography and
Network Security - Behroz A. Forouzan), (2013 International Conference on
Communication Systems and Network Technologies-IEEE).
Symmetric encryption is widely used to enforce data security and provide other
cryptographic primitives. Despite significant research that has led to the
development of sophisticated symmetric encryption algorithms, very little has
been done to develop systematic frameworks that can support the creation of
adaptable, application-specific encryption techniques with varying levels of
security. (2013 International Conference on Control, Computing, Communication and
Materials (ICCCCM), IEEE)
My new traditional symmetric-key ciphers is depends on my own algorithm of
theory (set of integers) of arithmetic integers. It includes two operation of
mathematics: Binary Operation, Division Operation and Number to Digit to
Number Convert.
The message that is sent through the channel is called the ciphertext.
To create ciphertext from plaintext, Alice uses encryption algorithm & shared
secret key.
To create plaintext from ciphertext, Bob uses a decryption algorithm & same
secret key. (Cryptography and Network Security-Behroz A. Forouzan).
Traditional symmetric-key ciphers classifaction:
Substitution Ciphers:
A transposition cipher does not substitute one symbol for another; instead it
changes the location of the symbols.
A symbol in the first position of the plaintext may appear in the ninth position of
the ciphertext. A symbol in the eighth position of the plaintext may appear in the
first position of the ciphertext. For example, the plaintext characters “hello” may
be encrypted as “elhol.”
A substitution cipher replaces one symbol with another. For example, we can
replace letter A with letter D, and letter T with letter Z. If the symbols are digits,
we can replace 3 with 7, 2 with 6.
Transposition ciphers:
Number theory:
It is used to understand why and how RSA works. Some algorithms use number
theory for the difficulty of factoring large numbers as their basis.
Linear Algebra:
Lagrange interpolation is used in Shamir's Secret Sharing Scheme. Some linear
operations are also used in AES.
Algebraic structure:
The theory of finite fields is used in multiparty computation.
Binary Operation
A binary operation takes two inputs (e.g. a and b) and creates one output (e.g. c).
In cryptography, we are interested in three binary operations applied to the set of
integers: addition, subtraction and multiplication and modulus.
Here, a =Dividend,
n =Divisor,
q =Quotient,
r =Remainder.
Z (odd) = n + (n-1)
The parts of my symmetric Cipher in cryptography :
1. Plaintext
2. Encryption Algorithm
3. Decryption Algorithm
4. Key
5. Number to Digit to Number convert
6. Ciphertext
Plaintext:
It is the original message that is being protected.
Example:
P3 = l = 11,
= 11*2 + {(11*2)^2 – (11*2-1)^2}
= 22 + 22^2 – 21^2
=22 + 43
= 65
65>26
65%26 and 65/26
65%26 =13 and 65/26 = 2
number to digit converts.
13 = N, and 2 = C
C’sText = N^C
P4 = l = 11,
C’sText = N^C
P5 = o = 14,
=14*2 + {(14*2)^2 – (14*2-1)^2}
= 28 + 28^2 – 27^2
= 28 + 55 = 83
83>26, 83%26 = 5 = F and 83 /26 = 3 = D, (number to digit convert.)
C’sText = F^D
Note:
o Convert number to digit is included with binary and division
operation.
o Convert digits to number is addition of digit * place value.
Example:
23 = 3p. 2 – 1
6p = 24
P=4=e
Plaintext = e
3. C’sText = N^C is power based cipher text, N = 13, C = 2,