A New Bit Level Positional Encryption Algorithm (NBLPEA ver-1)

Authors

  • Asoke Nath Department of Computer Science, St. Xavier’s College (Autonomous), Kolkata, India
  • Sankar Das Department of Computer Science, St. Xavier’s College (Autonomous), Kolkata, India
  • Oishi Mazumder Department of Computer Science, St. Xavier’s College (Autonomous), Kolkata, India
  • Adrija Saha Department of Computer Science, St. Xavier’s College (Autonomous), Kolkata, India
  • Monimoy Ghosh Department of Computer Science, St. Xavier’s College (Autonomous), Kolkata, India

DOI:

https://doi.org/10.26438/ijcse/v8i4.167172

Keywords:

Plain text, ciphertex, encryption, decryption, transposition, positional extraction

Abstract

In the world of information we live in, cyber security is of paramount importance. Despite communicating through secure channels, there might be breaches that might be targeted by attackers to extract valuable data. Designing and betterment of these symmetric and asymmetric algorithms remain an open challenge to all. The Bitwise Positional Encryption Algorithm is a completely new idea in this field. This simple encryption technique provides strong protection against any kind of attack, be it brute force or statistical attacks. This multilevel encryption algorithm employs several bitlevel encryption procedures and matrix transposition operations. It takes into consideration positional parameters of bits, which is further shuffled randomly and hence is impossible for the intruder to decrypt without knowing the key as well as the exact method.  The key here should be a shared parameter, for this is an instance of symmetric encryption. The algorithm works on bit-level so it is not possible to break easily. By this algorithm, one can encrypt any kind of file with extensions like .txt, .doc, .jpg, .png and the like. The present method can be used for encryption of any confidential messages like OTP (One Time Password), ATM transactions etc. It is not possible to get back the original plain text file if there is one change in bits in encrypted text. The testing is done on almost all types of files and it was found that the method is working satisfactorily.

References

[1] William Stallings, “Cryptography and Network Security: Principles and Practice”, Tata Mc-Graw Hill Publishing LTD.

[2] Behrouz A. Forouzan, “Cryptography and Network Security”, Special Indian edition 2007, Tata Mc-Graw Hill Publishing LTD.

[3] Ronald A. Gove, “Introduction to Encryption Technology.”

[4] Dan Boneh, Victor Shoup, “A Graduate Course in Applied Cryptography.” from Stanford University.

[5] Sachin Sharma, Jeevan Singh Bisht, “Performance Analysis of Data Encryption Algorithms”, Volume-3, Issue-1, pp. 1-5, 2015.

[6] M. Arora, S. Sharma, “Synthesis of Cryptography and Security Attacks”, Volume-5, Issue-5, Oct 2017.

[7] Sreeparna Chakrabarti, Dr. G.N.K. Suresh Babu, “A Literature Survey on the Cryptographic Encryption Algorithms for Secured Data Communication.” in International Journal on Future Revolution in Computer Science & Communication Engineering Volume: 4 Issue: 10.

[8] Asoke Nath, Soumyadip Ray, Salil Anthony Dhara, Sourav Hazra, “3-Dimensional Bit Level Encryption Algorithm Version-3 (3DBLEA-3)”, International Journal of Latest Trends in Engineering and Technology Vol.(10)Issue(2), pp.347-353

[9] Bit Level Encryption Standard(BLES) : Version-I, Neeraj Khanna, Dripto Chatterjee, Joyshree Nath and Asoke Nath, International Journal of Computer Applications(IJCA)(0975-8887) USA Volume 52-No.2.,Aug, Page.41-46(2012).

[10] Multi Way Feedback Encryption Standard Ver1, Purnendu Mukherjee, Prabal Banerjee, Asoke Nath, IJACR, published in September 2013 issue.

Downloads

Published

2020-04-30
CITATION
DOI: 10.26438/ijcse/v8i4.167172
Published: 2020-04-30

How to Cite

[1]
A. Nath, S. Das, O. Mazumder, A. Saha, and M. Ghosh, “A New Bit Level Positional Encryption Algorithm (NBLPEA ver-1)”, Int. J. Comp. Sci. Eng., vol. 8, no. 4, pp. 167–172, Apr. 2020.

Issue

Section

Research Article