Skip to main content

2019 | OriginalPaper | Buchkapitel

CipherBit192: Encryption Technique for Securing Data

verfasst von : Benedicto B. Balilo Jr., Bobby D. Gerardo, Yungcheol Byun

Erschienen in: Applied Computing and Information Technology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cryptography is an important component in securing and protecting sensitive and confidential data. It is a technique of encrypting data, hiding the process and produced a ciphered text. The Data Encryption Standard (DES) algorithm is considerably known for its branded encryption/decryption technique. To explore the advantage of its recognized cycle process and ciphertext representation. This paper presents the new algorithm based on mixed technique by substituting reverse scheme, swapping and bit-manipulation. This encryption technique is a concept that combines selected cryptographic technique that can reduce and save time processing encryption operation, offers simplicity, and extended mixed encryption key generation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Rhee, M.Y.: Internet Security. Crytographic principles, algorithms, and protocols, p. 57 Rhee, M.Y.: Internet Security. Crytographic principles, algorithms, and protocols, p. 57
8.
Zurück zum Zitat Internet Security, Chap. 4 [ppt] slide 45–46 Internet Security, Chap. 4 [ppt] slide 45–46
10.
Zurück zum Zitat Bansal, S., Shrivasta, R.: The IUP Journal of Computer sciences, vol. V, no. 4 (2011) Bansal, S., Shrivasta, R.: The IUP Journal of Computer sciences, vol. V, no. 4 (2011)
11.
Zurück zum Zitat Bhagat, P., Satpute, K., Palekar, V.: Reverse encryption algorithm: a technique for encryption & decryption. Int. J. Latest Trends Eng. Technol. (IJLTET) 2(1), 91 (2013) Bhagat, P., Satpute, K., Palekar, V.: Reverse encryption algorithm: a technique for encryption & decryption. Int. J. Latest Trends Eng. Technol. (IJLTET) 2(1), 91 (2013)
12.
Zurück zum Zitat Lee, S., Park, T., Lee, D., Nam, T., Kim, S.: Chaotic order preserving encryption for efficient and secure queries on databases. IEICE Trans. Inf. Syst. 92, 207–217 (2009) Lee, S., Park, T., Lee, D., Nam, T., Kim, S.: Chaotic order preserving encryption for efficient and secure queries on databases. IEICE Trans. Inf. Syst. 92, 207–217 (2009)
13.
Zurück zum Zitat Ceselli, A., Damiani, E., Vimercati, S.D.C.D., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inf. Syst. Secur. 8(1), 119–152 (2005)CrossRef Ceselli, A., Damiani, E., Vimercati, S.D.C.D., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inf. Syst. Secur. 8(1), 119–152 (2005)CrossRef
14.
Zurück zum Zitat Damiani, E., Di Vimercati, S.D.C., Finetti, M., Paraboschi, S., Samarati, P., Jajodia, S.: Implementation of a storage mechanism for untrusted DBMSs. In: IEE Security in Storage Workshop 2003, pp. 38–46 (2003) Damiani, E., Di Vimercati, S.D.C., Finetti, M., Paraboschi, S., Samarati, P., Jajodia, S.: Implementation of a storage mechanism for untrusted DBMSs. In: IEE Security in Storage Workshop 2003, pp. 38–46 (2003)
15.
Zurück zum Zitat Hacigümüş, H., Iyer, B., Mehrotra, S.: Ensuring the integrity of encrypted databases in the database-as-a-service model. In: DBSec 17th Annual Working Conference on Data and Application Security, Kluwer, pp. 61–74 (2003) Hacigümüş, H., Iyer, B., Mehrotra, S.: Ensuring the integrity of encrypted databases in the database-as-a-service model. In: DBSec 17th Annual Working Conference on Data and Application Security, Kluwer, pp. 61–74 (2003)
16.
Zurück zum Zitat Tang, Q., Ji, D.: Verifiable attribute based encryption. Int. J. Netw. Secur. 10(2), 114–120 (2010)MathSciNet Tang, Q., Ji, D.: Verifiable attribute based encryption. Int. J. Netw. Secur. 10(2), 114–120 (2010)MathSciNet
17.
Zurück zum Zitat Kumar, Y., Joshi, R., Mandavi, T., Bharti, S., Rathour, R.: Enhancing the security of data using DES algorithm along with substitution technique. Int. J. Eng. Comput. Sci. 5(10), 18395–18398 (2016). www.ijecs.in, ISSN 2319-7242 Kumar, Y., Joshi, R., Mandavi, T., Bharti, S., Rathour, R.: Enhancing the security of data using DES algorithm along with substitution technique. Int. J. Eng. Comput. Sci. 5(10), 18395–18398 (2016). www.​ijecs.​in, ISSN 2319-7242
18.
Zurück zum Zitat Jain, A., Dedia, R., Ppatil, A.: Enhancing the security of caesar cipher substitution method using a randomized approach for more secure communication. Int. J. Comput. Appl. 129(13), 6–11 Jain, A., Dedia, R., Ppatil, A.: Enhancing the security of caesar cipher substitution method using a randomized approach for more secure communication. Int. J. Comput. Appl. 129(13), 6–11
19.
Zurück zum Zitat Vyas, B., Vajpayee, A.: Local data security thought encryption. IJSART 2(8), 10–15 (2016) Vyas, B., Vajpayee, A.: Local data security thought encryption. IJSART 2(8), 10–15 (2016)
20.
Zurück zum Zitat Alanazi, H.O., Zaidan, B.B., Zaidan, A.A., Jalab, H.A., Shabbir, M., Al-Nabhani, Y.: New comparative study between DES, 3DES and AES within Nine factors. J. Comput. 2(3), 152–157 (2010) Alanazi, H.O., Zaidan, B.B., Zaidan, A.A., Jalab, H.A., Shabbir, M., Al-Nabhani, Y.: New comparative study between DES, 3DES and AES within Nine factors. J. Comput. 2(3), 152–157 (2010)
22.
Zurück zum Zitat Fathy, A., Tarrad, I.F., Hamed, H.F.A., Awad, A.I.: Advanced encryption standard algorithm: issues and implementation aspects. In: Hassanien, A.E., Salem, AB.M., Ramadan, R., Kim, T. (eds.) Advanced Machine Learning Technologies and Applications, AMLTA 2012. Communications in Computer and Information Science, vol 322. Springer, Heidelberg (2012) Fathy, A., Tarrad, I.F., Hamed, H.F.A., Awad, A.I.: Advanced encryption standard algorithm: issues and implementation aspects. In: Hassanien, A.E., Salem, AB.M., Ramadan, R., Kim, T. (eds.) Advanced Machine Learning Technologies and Applications, AMLTA 2012. Communications in Computer and Information Science, vol 322. Springer, Heidelberg (2012)
23.
Zurück zum Zitat Daemen, J., Rijmen, V.: The block cipher Rijndael. In: Smart Card Research and Applications. LNCS, vol. 1820, pp. 288–296. Springer Daemen, J., Rijmen, V.: The block cipher Rijndael. In: Smart Card Research and Applications. LNCS, vol. 1820, pp. 288–296. Springer
25.
Zurück zum Zitat Katkade, P., Phade, G.M.: Application of AES algorithm for data security in serial communication. In: IEEE International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, August 2016 Katkade, P., Phade, G.M.: Application of AES algorithm for data security in serial communication. In: IEEE International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, August 2016
Metadaten
Titel
CipherBit192: Encryption Technique for Securing Data
verfasst von
Benedicto B. Balilo Jr.
Bobby D. Gerardo
Yungcheol Byun
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-98370-7_11