SlideShare a Scribd company logo
International Journal of Computer Applications Technology and Research
Volume 5– Issue 6, 391 - 394, 2016, ISSN:- 2319–8656
www.ijcat.com 391
A New Method for Encrypting Digital Data Using
Symmetric Key in Information Exchange Spaces
Hadi Hajilar Lahrod
Department of Electrical
Engineering, Ahar Branch,
Islamic Azad University,
Ahar, Iran.
Ali Rahnemaei
Department of Electrical
Engineering, Ardabil
Branch, Islamic Azad
University, Ardabil, Iran.
Seyed Hadi Seyed Hatami
Department of Electrical
Engineering, Ardabil
Branch, Islamic Azad
University, Ardabil, Iran.
Abstract: with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution.
Keywords: Encryption; symmetric; XOR operator; text information; key.
1. INTRODUCTION
One way to provide safety information is encryption. With
encryption, confidentiality and message authenticity are
preserved. The main problem in cryptography is that the
threats neither cannot obtain the original text of encrypted
text, nor cannot find the decoding converters even by
accessing the original text. In this case, the amount
information obtained from the encrypted text and encoding
method are important [1]. Cryptography includes of two
major components, an algorithm and a key. Algorithm is a
converter or mathematical formula. There are a few powerful
algorithms that most of them have been published as
standards or mathematical papers. Key is a string of binary
digits (ones and zeros) which is meaningless by itself. Modern
cryptography assumes that an algorithm is known or can be
discovered. Key must be kept secret and changed in any stage
of implementing. Decryption may use the same pair of
algorithms and key. Data encryption algorithms are generally
divided into two categories. The first batch contains
symmetric encryption algorithms while the second category
contains asymmetric cipher algorithms. Asymmetric key
encryption algorithms use different keys for encryption and
decryption. Many systems allow the one of publicly keys to
be released while another private key is kept by its owner.
Sender of the message codes the text with the recipient's
public key and receptor encrypts it with their private key. In
other words, only recipient's private key makes it possible to
turn the coded text to the original one. It means that even if
the sender accesses the main content text, they cannot achieve
to the original text via cipher text. Therefore the coded
message will be meaningless for any recipient rather than the
real one [2]. Therefore, with studying algorithms that has been
used before in this context, a new solution for encrypting
confidential information can affect and help establishment of
security in communications. In this paper we propose a new
method for encrypting digital data using asymmetric key in
the exchange of information spaces.
2. SECURITY REQUIREMENTS
Each encryption algorithm that is used to create data security
should ensure some specific security requirements which are
as follows:
2.1 Confidentiality of data's
The main purpose in security issues is to maintain data
confidentially from unauthorized user accesses. In fact, data
confidentiality is means maintenance of information secretly.
Different protocols use various cryptographic methods.
2.2 Data integrity
Making information confidential, external factors cannot steal
information, but it does not meant the secure and healthy data.
Data integrity ensures that the received data has been
remained unchanged during transmitting.
2.3 Data Novelty
Data novelty ensures that received data is new and is not a
repeat of previous messages.
2.4 Authentication
Encryption algorithms must have the authentication ability of
the received data, and can ensure the accuracy of the
transmitter. The sender of information cannot, in the future,
deny sending or its provisions. Various security protocols use
different encryption algorithms to meet these requirements.
3. CLASSIFICATION OF ENCRYPTION
METHODS
An encryption algorithm is a set of rules and mathematical
relationships which ends in a difference and clutter in the
data. Modern encryption algorithms can be classified based on
two criteria; functional keys and type of input. Data
encryption method is divided, based on input data type, into
two blocks and streams. Most of the techniques presented are
based on the image encryption [3][4].
International Journal of Computer Applications Technology and Research
Volume 5– Issue 6, 391 - 394, 2016, ISSN:- 2319–8656
www.ijcat.com 392
4. SYMMETRIC ENCRYPTION
In general, symmetric encryption has two parts, sender and
receiver, which want to communicate with each other in an
insecure channel, without letting someone else to get any
information on the relationship. The purpose of encryption
algorithms is to protect the security of a message that is
transmitted through an insecure channel. In general an
organization symmetric encryption has two functions,
encryption E and decryption D. The Encryption function E
receives the inverse of the original text as an input, and
transforms it under the key K to cipher text .
The encryption function is reverse function of
encryption function, so the key B is also
called secret key or shared key. In Fig.1, a general block
diagram of symmetric encryption system has been shown.
Fig.1 Block diagram of symmetric encryption system
5. RELATED WORKS
Security information in communication technology is one of
the issues that has occupied scholars of this area, because with
compromising information security, serious problems happen
to come for the message and threaten its integrity. Due to this
problem, scientists went on to make secret before exchanging
information and in the consequent, they reduce or neutralize
the effect of inhibiting factors. With technological advances
and the advent of modern communications, the need to provide
new methods in this area is greater than ever. Thus, according
to expand of the use of communication technology in
transmitting critical data, the privacy and data security are of
utmost importance. There have been done multiple algorithms
to encrypt data too [5][6][7]. In some other activities
encryption of data has been investigated for various methods
[8][9]. Various proposed methods in encryption information
are divided generally into two categories: stream encryption
and blocks encryption [10][11]. In the first kind, at any
moment, encryption is done bit by bit or character by
character, but in the second the entire string is encrypted and
transmitted at once. Generally, for both encryption methods,
the keys are used which are made of pseudorandom numbers.
There are several methods for generating random numbers
such as modular arithmetic generators, linear and non-linear,
linear recurrence registers (LFSR) and a non-linear Cellular
Automata (CA) and so on [12]. Access to information stored in
computer databases has greatly increased. Much of the
information stored is highly confidential, which is not visible
to the public. Data security is studied using encryption
techniques research conducted in an article with this theme, a
new encryption algorithm is provided based on concept of
block encryption, and logical operations such as XOR and shift
operations are used as well. The proposed algorithm improves
encryption security by symmetric putting layers [13]. Visual
secret sharing (VAS) is a visual encryption scheme which
decodes secret messages to several big stocks [14].
6. ENCRYPTION APPROACH
The proposed encryption system is one of the symmetric
systems that guarantee an absolute security. Overall approach
of this system is to generate key length of plain text and XOR
keys with text. In this method, the receiver of the message
must have the encryption key up with XOR again, restore the
original text. Totally randomness key, full security for the
proposed system ensures this approach also high
computational security in the face of the enemy. In building
public key cryptography systems, objective of securing is
computational. In this case, although these systems are not
secure against invaders, such strikers do not exist in the real
world.
Fig. 2 Main operation the proposed algorithm
7. DESCRIPTION OF THE PROPOSED
ALGORITHM
In some methods, particular keys are used to perform
encryption and decryption. Used keys can be the same in
encryption and decryption and/or are used differently in these
two factors. There are other algorithms that do not use keys for
encryption. These methods create kind of clutter in messages
and through this prevent the discovery of information, by
unauthorized persons. Different encryption algorithms, as
symmetric, asymmetric and hash functions are used for hiding
and for each of these algorithms there have been proposed
various methods. In the proposed method, we consider a text
file, according to the same text we convert it to an array of
characters. Then these characters are converted to an array of
bits. Key Length for encrypt information should be ideal, if
key length is greater, the security is then better and speed is
lower, and vice versa, if the key length is less, security is less
and encryption speed increases. In this paper we consider 128-
bit key length. After selecting key length, it will be applied on
the bits array in the range of 2/128. We divide bits array to 128
bits, this is our method for performing encryption. In each
stage, the XOR operation will be also applied; XOR operation
is as follows: after division of bits array to 128 bits, the first
part of the array of bits that is 128-bit with key is done by
XOR. After encrypting the first part of the array, this time half
a second part of the array with half of the first part of the array
with XOR action key is done; we do this action until
completing the array and cryptographic operation. In the
proposed method we used XOR operator to easily perform the
encryption and decryption. How to do encrypt text is shown in
Fig. 3:
International Journal of Computer Applications Technology and Research
Volume 5– Issue 6, 391 - 394, 2016, ISSN:- 2319–8656
www.ijcat.com 393
Fig.3 Description of the proposed approach
Encrypting the information
Data encryption algorithm in this method is very simple.
1. Converting secret text information to array of characters
2. Considering key length 128 bits
3. Key actions on array with range of 2/128
4. XOR perform on array with key consideration
8. IMPLEMENTATION RESULTS
For performing the test we used different texts for encryption.
According to the results, it can be observed that the proposed
algorithm is the fastest algorithm based on run-time. These
results have been achieved using MATLAB 2009 software.
The study of results shows that the encoded information
output resulting from encryption method has been reported
with security and high quality. We used "English" text in
implementation of the proposed algorithm for encryption. In
Fig.4 the English confidential text is used for encryption. Also
Fig.5 and 6 show, respectively, English text information
before the operation encryption and information encrypted
after encryption. So after encryption operation and applying
the proposed method, confidential data turns out to be in the
shape of Fig.7.
Fig.4 Confidential information for encrypting
Fig.5 Text information for encryption
Fig.6 information encrypted
Fig.7 information encrypted
In comparison between different encryption algorithms with
data size and various keys size, the proposed algorithm
represents the best performance. Table 1 compares the
processing speed of the proposed encryption algorithm with
International Journal of Computer Applications Technology and Research
Volume 5– Issue 6, 391 - 394, 2016, ISSN:- 2319–8656
www.ijcat.com 394
different key lengths with three known block ciphers. As the
table shows the proposed algorithm, with length 128-bit, runs
faster than other encryption methods and can serve up
operations. The proposed algorithm, due to speed and simpler
being implemented, is a type of symmetric cryptography for
protecting information in network communication and can be
used for protection of data on public channels. Time speed of
encrypting and decrypting depends largely on encryption key
length and file size. For obtaining confidential information and
decoding it, decryption key is generated as the same generation
method of encryption key, and output encrypted text being
XOR to obtain a plain text.
Table 1. Comparison symmetric ciphers processing speed
with the proposed algorithm
speed(Mbps)Type codeLength key
9DES56
33DES168
0.9RC2Variable
45RC4Variable
52Proposed method128
9. CONCLUSION
This article provides a secure method for encrypting text with
respect to the symmetric key and XOR operator. The proposed
method converts confidential information into an array of
characters, then using a 128-bit symmetric key encrypts
information via XOR operator, In fact the main stage is to use
key and to take the XOR operator. For decryption we act in
contrast to encryption. In the decode step, in first, we have a
symmetric key along with the encrypted information. And
according to encryption routine, we select the text again
character by character and, using XOR operator, decrypt
confidential information. Evaluation of the proposed method
showed that encryption of confidential information is better
than other methods. Security and data confidentiality in the
proposed algorithm is maximum. After implementation and
testing various data on the proposed algorithm we reached the
conclusion that our proposed algorithm, compared to
algorithms provided in the field, is more efficient and
decryption of it, without the key, is more difficult and even
impossible to solve. Also the algorithm speed, due to the
simplicity of the method, is of high operating and computing
speed. As suggestions for future studies we can note to
examine asymmetric algorithms and data hiding by the
algorithm.
10. REFERENCES
[1] A. Menezes, P.van Oorschot and S. Vanstone, "Handbook
of Applied Cryptography", CRC Press, 1996.
[2] Jacob John, “Cryptography for resource constrained
devices :A Survey”, Article in a regular journal,
International Journal on Computer Science &
Engineering, 2012.
[3] Ching-Nung Yang, Pin-Wei Chen, Hsiang-Wen Shih,
Cheonshik Kim, Aspect ratio invariant visual
cryptography by image filtering and resizing, Personal
Ubiquitous Comput. 17 (5) (2013) 843–850.
[4] Kai-Hui Lee, Pei-Ling Chiu, Image size invariant visual
cryptography for general access structures subject to
display quality constraints, IEEE Trans. Image Process.
22 (10) (2013) 3830–3841.
[5] Ching-Nung Yang, Ting-Hao Chung, " A general multi-
secret visual cryptography scheme", Elsevier, Optics
Communications 283 (2010) 4949–4962.
[6] Jasdeep Singh Bhalla, PreetiNagrath ,Article in a regular
journal, International Journal of Scientific & Research
publications,”Nested Digital Image Watermarking
Technique Using Blowfish Encryption Algorithm”,
Volume 3, Issue 4, April 2013.
[7] A.Nath, S.Ghosh, M.A.Mallik, "Symmetric key
cryptography using random key generator", Proceedings
of International conference on SAM-2010 held at Las
Vegas (USA) 12-15 July, 2010, Vol-2, P-239-244.
[8] Sui L, Duan K, Liang J, "Double-image encryption based
on discrete multiple-parameter fractional angular
transform and two-coupled logistic maps", Optics
Communications Volume343, Elsevier ,2015, PP. 140–
149.
[9] Sajasi S, Eftekhari Moghadam A.M, "An adaptive image
steganographic scheme based on Noise Visibility
Function and an optimal chaotic based encryption
method", Applied Soft Computing, Volume 30, Elsevier,
May 2015, PP. 375–389.
[10] Nikita Arora,Yogita Gigras, "Block and Stream Cipher
Based Cryptographic Algorithms: A Survey",
International Journal of Information and Computation
Technology, ISSN 0974-2239 Volume 4, Number 2
(2014), pp. 189-196.
[11] D.J.C. MacKay, "Information Theory, Inference,
andLearning Algorithms", June 26, 2003, Cambridge
university Press.
[12] S. Haykin, "Neural Networks – A Comprehensive
Fundation", 2th Edition, Prentice Hall, 1999.
[13] Vishwa gupta, Gajendra Singh, Ravindra Gupta,
"Advance cryptography algorithm for improving data
security", International Journal of Advanced Research in
Computer Science and Software Engineering, Volume 2,
Issue 1, January 2012.
[14] Lee, CH, Chen H, Liu H, Chen G, "A new visual
cryptography with multi-level encoding", Journal of
Visual Languages and Computing, Elsevier, Volume 25,
Issue 3, June 2014, PP 243–250.

More Related Content

What's hot (19)

PDF
Improved Image Encryption for Real-Time Application over Wireless Communicati...
ijeei-iaes
 
PDF
Overview on Symmetric Key Encryption Algorithms
IJERA Editor
 
PDF
Cryptography and Network Lecture Notes
FellowBuddy.com
 
PDF
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
PDF
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
PDF
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
 
PDF
A Study of Different Partitioning Clustering Technique
ijsrd.com
 
PPT
File transfer with multiple security mechanism
Shubham Patil
 
PDF
Network security 10EC832 vtu notes
Jayanth Dwijesh H P
 
PDF
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
 
PDF
Comparative Study of Cryptography Algorithms and Its’ Applications
MahmudJion
 
PDF
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
PDF
CNS Solution
Nitin Kanzariya
 
PDF
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
 
PDF
ijrrest_vol-2_issue-2_015
Ashish Gupta
 
PDF
N45028390
IJERA Editor
 
PDF
State of the art realistic cryptographic
ijcsa
 
PDF
Vtu network security(10 ec832) unit 1 notes
Jayanth Dwijesh H P
 
PDF
Vtu network security(10 ec832) unit 5 notes.
Jayanth Dwijesh H P
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
ijeei-iaes
 
Overview on Symmetric Key Encryption Algorithms
IJERA Editor
 
Cryptography and Network Lecture Notes
FellowBuddy.com
 
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Performance Comparison of File Security System using TEA and Blowfish Algorithms
ijtsrd
 
A Study of Different Partitioning Clustering Technique
ijsrd.com
 
File transfer with multiple security mechanism
Shubham Patil
 
Network security 10EC832 vtu notes
Jayanth Dwijesh H P
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit
 
Comparative Study of Cryptography Algorithms and Its’ Applications
MahmudJion
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
CNS Solution
Nitin Kanzariya
 
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
 
ijrrest_vol-2_issue-2_015
Ashish Gupta
 
N45028390
IJERA Editor
 
State of the art realistic cryptographic
ijcsa
 
Vtu network security(10 ec832) unit 1 notes
Jayanth Dwijesh H P
 
Vtu network security(10 ec832) unit 5 notes.
Jayanth Dwijesh H P
 

Viewers also liked (16)

PDF
Ijcatr04041021
Editor IJCATR
 
PDF
Ijsea04021001
Editor IJCATR
 
PDF
Ijcatr04041016
Editor IJCATR
 
PDF
Efficient & Lock-Free Modified Skip List in Concurrent Environment
Editor IJCATR
 
PDF
Ijcatr04051013
Editor IJCATR
 
PDF
The Critical Technological Factors OF E-Government in Kenya
Editor IJCATR
 
PDF
Ijcatr04051004
Editor IJCATR
 
PDF
Ijsea04031013
Editor IJCATR
 
PDF
Design and Analysis of Robotic Rover with Gripper Arm using Embedded C
Editor IJCATR
 
PDF
Prediction Model Using Web Usage Mining Techniques
Editor IJCATR
 
PDF
Efficient Resource Management Mechanism with Fault Tolerant Model for Computa...
Editor IJCATR
 
PDF
Ijcatr04041020
Editor IJCATR
 
PDF
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
Editor IJCATR
 
PDF
Reverse Engineering for Documenting Software Architectures, a Literature Review
Editor IJCATR
 
PDF
Ijcatr04051006
Editor IJCATR
 
PDF
A Survey on Agriculture Monitoring Using Wireless Sensor Network
Editor IJCATR
 
Ijcatr04041021
Editor IJCATR
 
Ijsea04021001
Editor IJCATR
 
Ijcatr04041016
Editor IJCATR
 
Efficient & Lock-Free Modified Skip List in Concurrent Environment
Editor IJCATR
 
Ijcatr04051013
Editor IJCATR
 
The Critical Technological Factors OF E-Government in Kenya
Editor IJCATR
 
Ijcatr04051004
Editor IJCATR
 
Ijsea04031013
Editor IJCATR
 
Design and Analysis of Robotic Rover with Gripper Arm using Embedded C
Editor IJCATR
 
Prediction Model Using Web Usage Mining Techniques
Editor IJCATR
 
Efficient Resource Management Mechanism with Fault Tolerant Model for Computa...
Editor IJCATR
 
Ijcatr04041020
Editor IJCATR
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
Editor IJCATR
 
Reverse Engineering for Documenting Software Architectures, a Literature Review
Editor IJCATR
 
Ijcatr04051006
Editor IJCATR
 
A Survey on Agriculture Monitoring Using Wireless Sensor Network
Editor IJCATR
 
Ad

Similar to A New Method for Encrypting Digital Data Using Symmetric Key in Information Exchange Spaces (19)

PDF
L017136269
IOSR Journals
 
PDF
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
PDF
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
sadinenitejaswi23cse
 
PDF
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
 
PDF
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
 
PDF
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
 
PDF
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
IJNSA Journal
 
PDF
Analysis of Cryptography Techniques
editor1knowledgecuddle
 
PDF
A Survey On The Cryptographic Encryption Algorithms
Joe Osborn
 
PDF
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
IRJET Journal
 
PDF
H42063743
IJERA Editor
 
PDF
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
 
PDF
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
ijcisjournal
 
PDF
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
ijcisjournal
 
PDF
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
PDF
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
PDF
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
PDF
Implement a novel symmetric block
ijcisjournal
 
L017136269
IOSR Journals
 
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
WINSEM2023-24_BCSE309L_TH_VL2023240500748_2024-03-19_Reference-Material-II.pdf
sadinenitejaswi23cse
 
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
IJNSA Journal
 
Analysis of Cryptography Techniques
editor1knowledgecuddle
 
A Survey On The Cryptographic Encryption Algorithms
Joe Osborn
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
IRJET Journal
 
H42063743
IJERA Editor
 
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
ijcisjournal
 
A QUANTUM CRYPTOGRAPHY PROTOCOL FOR ACCESS CONTROL IN BIG DATA
ijcisjournal
 
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
Implement a novel symmetric block
ijcisjournal
 
Ad

More from Editor IJCATR (20)

PDF
Advancements in Structural Integrity: Enhancing Frame Strength and Compressio...
Editor IJCATR
 
PDF
Maritime Cybersecurity: Protecting Critical Infrastructure in The Digital Age
Editor IJCATR
 
PDF
Leveraging Machine Learning for Proactive Threat Analysis in Cybersecurity
Editor IJCATR
 
PDF
Leveraging Topological Data Analysis and AI for Advanced Manufacturing: Integ...
Editor IJCATR
 
PDF
Leveraging AI and Principal Component Analysis (PCA) For In-Depth Analysis in...
Editor IJCATR
 
PDF
The Intersection of Artificial Intelligence and Cybersecurity: Safeguarding D...
Editor IJCATR
 
PDF
Leveraging AI and Deep Learning in Predictive Genomics for MPOX Virus Researc...
Editor IJCATR
 
PDF
Text Mining in Digital Libraries using OKAPI BM25 Model
Editor IJCATR
 
PDF
Green Computing, eco trends, climate change, e-waste and eco-friendly
Editor IJCATR
 
PDF
Policies for Green Computing and E-Waste in Nigeria
Editor IJCATR
 
PDF
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Editor IJCATR
 
PDF
Optimum Location of DG Units Considering Operation Conditions
Editor IJCATR
 
PDF
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Editor IJCATR
 
PDF
Web Scraping for Estimating new Record from Source Site
Editor IJCATR
 
PDF
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Editor IJCATR
 
PDF
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Editor IJCATR
 
PDF
A Strategy for Improving the Performance of Small Files in Openstack Swift
Editor IJCATR
 
PDF
Integrated System for Vehicle Clearance and Registration
Editor IJCATR
 
PDF
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Editor IJCATR
 
PDF
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR
 
Advancements in Structural Integrity: Enhancing Frame Strength and Compressio...
Editor IJCATR
 
Maritime Cybersecurity: Protecting Critical Infrastructure in The Digital Age
Editor IJCATR
 
Leveraging Machine Learning for Proactive Threat Analysis in Cybersecurity
Editor IJCATR
 
Leveraging Topological Data Analysis and AI for Advanced Manufacturing: Integ...
Editor IJCATR
 
Leveraging AI and Principal Component Analysis (PCA) For In-Depth Analysis in...
Editor IJCATR
 
The Intersection of Artificial Intelligence and Cybersecurity: Safeguarding D...
Editor IJCATR
 
Leveraging AI and Deep Learning in Predictive Genomics for MPOX Virus Researc...
Editor IJCATR
 
Text Mining in Digital Libraries using OKAPI BM25 Model
Editor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Editor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
Editor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Editor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Editor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Editor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Editor IJCATR
 

Recently uploaded (20)

PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
 
PPTX
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
PPTX
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 
PDF
Next Generation AI: Anticipatory Intelligence, Forecasting Inflection Points ...
dleka294658677
 
PDF
FME in Overdrive: Unleashing the Power of Parallel Processing
Safe Software
 
PPTX
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
PDF
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PDF
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
PPTX
CapCut Pro PC Crack Latest Version Free Free
josanj305
 
PDF
Introducing and Operating FME Flow for Kubernetes in a Large Enterprise: Expe...
Safe Software
 
PPTX
Practical Applications of AI in Local Government
OnBoard
 
PPTX
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Deploy Faster, Run Smarter: Learn Containers with QNAP
QNAP Marketing
 
PDF
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
PDF
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
PDF
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
PDF
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
PPTX
Agentforce World Tour Toronto '25 - MCP with MuleSoft
Alexandra N. Martinez
 
PDF
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
 
2025 HackRedCon Cyber Career Paths.pptx Scott Stanton
Scott Stanton
 
01_Approach Cyber- DORA Incident Management.pptx
FinTech Belgium
 
Next Generation AI: Anticipatory Intelligence, Forecasting Inflection Points ...
dleka294658677
 
FME in Overdrive: Unleashing the Power of Parallel Processing
Safe Software
 
Agentforce World Tour Toronto '25 - Supercharge MuleSoft Development with Mod...
Alexandra N. Martinez
 
Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
Understanding The True Cost of DynamoDB Webinar
ScyllaDB
 
CapCut Pro PC Crack Latest Version Free Free
josanj305
 
Introducing and Operating FME Flow for Kubernetes in a Large Enterprise: Expe...
Safe Software
 
Practical Applications of AI in Local Government
OnBoard
 
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Deploy Faster, Run Smarter: Learn Containers with QNAP
QNAP Marketing
 
Optimizing the trajectory of a wheel loader working in short loading cycles
Reno Filla
 
How to Comply With Saudi Arabia’s National Cybersecurity Regulations.pdf
Bluechip Advanced Technologies
 
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
Agentforce World Tour Toronto '25 - MCP with MuleSoft
Alexandra N. Martinez
 
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 

A New Method for Encrypting Digital Data Using Symmetric Key in Information Exchange Spaces

  • 1. International Journal of Computer Applications Technology and Research Volume 5– Issue 6, 391 - 394, 2016, ISSN:- 2319–8656 www.ijcat.com 391 A New Method for Encrypting Digital Data Using Symmetric Key in Information Exchange Spaces Hadi Hajilar Lahrod Department of Electrical Engineering, Ahar Branch, Islamic Azad University, Ahar, Iran. Ali Rahnemaei Department of Electrical Engineering, Ardabil Branch, Islamic Azad University, Ardabil, Iran. Seyed Hadi Seyed Hatami Department of Electrical Engineering, Ardabil Branch, Islamic Azad University, Ardabil, Iran. Abstract: with the arrival of the information age and much more important information systems and communication in human everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of the tests show that the proposed method is better in terms of security and speed of execution. Keywords: Encryption; symmetric; XOR operator; text information; key. 1. INTRODUCTION One way to provide safety information is encryption. With encryption, confidentiality and message authenticity are preserved. The main problem in cryptography is that the threats neither cannot obtain the original text of encrypted text, nor cannot find the decoding converters even by accessing the original text. In this case, the amount information obtained from the encrypted text and encoding method are important [1]. Cryptography includes of two major components, an algorithm and a key. Algorithm is a converter or mathematical formula. There are a few powerful algorithms that most of them have been published as standards or mathematical papers. Key is a string of binary digits (ones and zeros) which is meaningless by itself. Modern cryptography assumes that an algorithm is known or can be discovered. Key must be kept secret and changed in any stage of implementing. Decryption may use the same pair of algorithms and key. Data encryption algorithms are generally divided into two categories. The first batch contains symmetric encryption algorithms while the second category contains asymmetric cipher algorithms. Asymmetric key encryption algorithms use different keys for encryption and decryption. Many systems allow the one of publicly keys to be released while another private key is kept by its owner. Sender of the message codes the text with the recipient's public key and receptor encrypts it with their private key. In other words, only recipient's private key makes it possible to turn the coded text to the original one. It means that even if the sender accesses the main content text, they cannot achieve to the original text via cipher text. Therefore the coded message will be meaningless for any recipient rather than the real one [2]. Therefore, with studying algorithms that has been used before in this context, a new solution for encrypting confidential information can affect and help establishment of security in communications. In this paper we propose a new method for encrypting digital data using asymmetric key in the exchange of information spaces. 2. SECURITY REQUIREMENTS Each encryption algorithm that is used to create data security should ensure some specific security requirements which are as follows: 2.1 Confidentiality of data's The main purpose in security issues is to maintain data confidentially from unauthorized user accesses. In fact, data confidentiality is means maintenance of information secretly. Different protocols use various cryptographic methods. 2.2 Data integrity Making information confidential, external factors cannot steal information, but it does not meant the secure and healthy data. Data integrity ensures that the received data has been remained unchanged during transmitting. 2.3 Data Novelty Data novelty ensures that received data is new and is not a repeat of previous messages. 2.4 Authentication Encryption algorithms must have the authentication ability of the received data, and can ensure the accuracy of the transmitter. The sender of information cannot, in the future, deny sending or its provisions. Various security protocols use different encryption algorithms to meet these requirements. 3. CLASSIFICATION OF ENCRYPTION METHODS An encryption algorithm is a set of rules and mathematical relationships which ends in a difference and clutter in the data. Modern encryption algorithms can be classified based on two criteria; functional keys and type of input. Data encryption method is divided, based on input data type, into two blocks and streams. Most of the techniques presented are based on the image encryption [3][4].
  • 2. International Journal of Computer Applications Technology and Research Volume 5– Issue 6, 391 - 394, 2016, ISSN:- 2319–8656 www.ijcat.com 392 4. SYMMETRIC ENCRYPTION In general, symmetric encryption has two parts, sender and receiver, which want to communicate with each other in an insecure channel, without letting someone else to get any information on the relationship. The purpose of encryption algorithms is to protect the security of a message that is transmitted through an insecure channel. In general an organization symmetric encryption has two functions, encryption E and decryption D. The Encryption function E receives the inverse of the original text as an input, and transforms it under the key K to cipher text . The encryption function is reverse function of encryption function, so the key B is also called secret key or shared key. In Fig.1, a general block diagram of symmetric encryption system has been shown. Fig.1 Block diagram of symmetric encryption system 5. RELATED WORKS Security information in communication technology is one of the issues that has occupied scholars of this area, because with compromising information security, serious problems happen to come for the message and threaten its integrity. Due to this problem, scientists went on to make secret before exchanging information and in the consequent, they reduce or neutralize the effect of inhibiting factors. With technological advances and the advent of modern communications, the need to provide new methods in this area is greater than ever. Thus, according to expand of the use of communication technology in transmitting critical data, the privacy and data security are of utmost importance. There have been done multiple algorithms to encrypt data too [5][6][7]. In some other activities encryption of data has been investigated for various methods [8][9]. Various proposed methods in encryption information are divided generally into two categories: stream encryption and blocks encryption [10][11]. In the first kind, at any moment, encryption is done bit by bit or character by character, but in the second the entire string is encrypted and transmitted at once. Generally, for both encryption methods, the keys are used which are made of pseudorandom numbers. There are several methods for generating random numbers such as modular arithmetic generators, linear and non-linear, linear recurrence registers (LFSR) and a non-linear Cellular Automata (CA) and so on [12]. Access to information stored in computer databases has greatly increased. Much of the information stored is highly confidential, which is not visible to the public. Data security is studied using encryption techniques research conducted in an article with this theme, a new encryption algorithm is provided based on concept of block encryption, and logical operations such as XOR and shift operations are used as well. The proposed algorithm improves encryption security by symmetric putting layers [13]. Visual secret sharing (VAS) is a visual encryption scheme which decodes secret messages to several big stocks [14]. 6. ENCRYPTION APPROACH The proposed encryption system is one of the symmetric systems that guarantee an absolute security. Overall approach of this system is to generate key length of plain text and XOR keys with text. In this method, the receiver of the message must have the encryption key up with XOR again, restore the original text. Totally randomness key, full security for the proposed system ensures this approach also high computational security in the face of the enemy. In building public key cryptography systems, objective of securing is computational. In this case, although these systems are not secure against invaders, such strikers do not exist in the real world. Fig. 2 Main operation the proposed algorithm 7. DESCRIPTION OF THE PROPOSED ALGORITHM In some methods, particular keys are used to perform encryption and decryption. Used keys can be the same in encryption and decryption and/or are used differently in these two factors. There are other algorithms that do not use keys for encryption. These methods create kind of clutter in messages and through this prevent the discovery of information, by unauthorized persons. Different encryption algorithms, as symmetric, asymmetric and hash functions are used for hiding and for each of these algorithms there have been proposed various methods. In the proposed method, we consider a text file, according to the same text we convert it to an array of characters. Then these characters are converted to an array of bits. Key Length for encrypt information should be ideal, if key length is greater, the security is then better and speed is lower, and vice versa, if the key length is less, security is less and encryption speed increases. In this paper we consider 128- bit key length. After selecting key length, it will be applied on the bits array in the range of 2/128. We divide bits array to 128 bits, this is our method for performing encryption. In each stage, the XOR operation will be also applied; XOR operation is as follows: after division of bits array to 128 bits, the first part of the array of bits that is 128-bit with key is done by XOR. After encrypting the first part of the array, this time half a second part of the array with half of the first part of the array with XOR action key is done; we do this action until completing the array and cryptographic operation. In the proposed method we used XOR operator to easily perform the encryption and decryption. How to do encrypt text is shown in Fig. 3:
  • 3. International Journal of Computer Applications Technology and Research Volume 5– Issue 6, 391 - 394, 2016, ISSN:- 2319–8656 www.ijcat.com 393 Fig.3 Description of the proposed approach Encrypting the information Data encryption algorithm in this method is very simple. 1. Converting secret text information to array of characters 2. Considering key length 128 bits 3. Key actions on array with range of 2/128 4. XOR perform on array with key consideration 8. IMPLEMENTATION RESULTS For performing the test we used different texts for encryption. According to the results, it can be observed that the proposed algorithm is the fastest algorithm based on run-time. These results have been achieved using MATLAB 2009 software. The study of results shows that the encoded information output resulting from encryption method has been reported with security and high quality. We used "English" text in implementation of the proposed algorithm for encryption. In Fig.4 the English confidential text is used for encryption. Also Fig.5 and 6 show, respectively, English text information before the operation encryption and information encrypted after encryption. So after encryption operation and applying the proposed method, confidential data turns out to be in the shape of Fig.7. Fig.4 Confidential information for encrypting Fig.5 Text information for encryption Fig.6 information encrypted Fig.7 information encrypted In comparison between different encryption algorithms with data size and various keys size, the proposed algorithm represents the best performance. Table 1 compares the processing speed of the proposed encryption algorithm with
  • 4. International Journal of Computer Applications Technology and Research Volume 5– Issue 6, 391 - 394, 2016, ISSN:- 2319–8656 www.ijcat.com 394 different key lengths with three known block ciphers. As the table shows the proposed algorithm, with length 128-bit, runs faster than other encryption methods and can serve up operations. The proposed algorithm, due to speed and simpler being implemented, is a type of symmetric cryptography for protecting information in network communication and can be used for protection of data on public channels. Time speed of encrypting and decrypting depends largely on encryption key length and file size. For obtaining confidential information and decoding it, decryption key is generated as the same generation method of encryption key, and output encrypted text being XOR to obtain a plain text. Table 1. Comparison symmetric ciphers processing speed with the proposed algorithm speed(Mbps)Type codeLength key 9DES56 33DES168 0.9RC2Variable 45RC4Variable 52Proposed method128 9. CONCLUSION This article provides a secure method for encrypting text with respect to the symmetric key and XOR operator. The proposed method converts confidential information into an array of characters, then using a 128-bit symmetric key encrypts information via XOR operator, In fact the main stage is to use key and to take the XOR operator. For decryption we act in contrast to encryption. In the decode step, in first, we have a symmetric key along with the encrypted information. And according to encryption routine, we select the text again character by character and, using XOR operator, decrypt confidential information. Evaluation of the proposed method showed that encryption of confidential information is better than other methods. Security and data confidentiality in the proposed algorithm is maximum. After implementation and testing various data on the proposed algorithm we reached the conclusion that our proposed algorithm, compared to algorithms provided in the field, is more efficient and decryption of it, without the key, is more difficult and even impossible to solve. Also the algorithm speed, due to the simplicity of the method, is of high operating and computing speed. As suggestions for future studies we can note to examine asymmetric algorithms and data hiding by the algorithm. 10. REFERENCES [1] A. Menezes, P.van Oorschot and S. Vanstone, "Handbook of Applied Cryptography", CRC Press, 1996. [2] Jacob John, “Cryptography for resource constrained devices :A Survey”, Article in a regular journal, International Journal on Computer Science & Engineering, 2012. [3] Ching-Nung Yang, Pin-Wei Chen, Hsiang-Wen Shih, Cheonshik Kim, Aspect ratio invariant visual cryptography by image filtering and resizing, Personal Ubiquitous Comput. 17 (5) (2013) 843–850. [4] Kai-Hui Lee, Pei-Ling Chiu, Image size invariant visual cryptography for general access structures subject to display quality constraints, IEEE Trans. Image Process. 22 (10) (2013) 3830–3841. [5] Ching-Nung Yang, Ting-Hao Chung, " A general multi- secret visual cryptography scheme", Elsevier, Optics Communications 283 (2010) 4949–4962. [6] Jasdeep Singh Bhalla, PreetiNagrath ,Article in a regular journal, International Journal of Scientific & Research publications,”Nested Digital Image Watermarking Technique Using Blowfish Encryption Algorithm”, Volume 3, Issue 4, April 2013. [7] A.Nath, S.Ghosh, M.A.Mallik, "Symmetric key cryptography using random key generator", Proceedings of International conference on SAM-2010 held at Las Vegas (USA) 12-15 July, 2010, Vol-2, P-239-244. [8] Sui L, Duan K, Liang J, "Double-image encryption based on discrete multiple-parameter fractional angular transform and two-coupled logistic maps", Optics Communications Volume343, Elsevier ,2015, PP. 140– 149. [9] Sajasi S, Eftekhari Moghadam A.M, "An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method", Applied Soft Computing, Volume 30, Elsevier, May 2015, PP. 375–389. [10] Nikita Arora,Yogita Gigras, "Block and Stream Cipher Based Cryptographic Algorithms: A Survey", International Journal of Information and Computation Technology, ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 189-196. [11] D.J.C. MacKay, "Information Theory, Inference, andLearning Algorithms", June 26, 2003, Cambridge university Press. [12] S. Haykin, "Neural Networks – A Comprehensive Fundation", 2th Edition, Prentice Hall, 1999. [13] Vishwa gupta, Gajendra Singh, Ravindra Gupta, "Advance cryptography algorithm for improving data security", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, January 2012. [14] Lee, CH, Chen H, Liu H, Chen G, "A new visual cryptography with multi-level encoding", Journal of Visual Languages and Computing, Elsevier, Volume 25, Issue 3, June 2014, PP 243–250.