Title: Robust symmetric cryptography using plain-text variant session key

Authors: Hari Narayan Khan; Ayan Chaudhuri; Souvik Kar; Parijat Roy; Atal Chaudhuri

Addresses: Department of Computer Science and Engineering, Regent Education and Research Foundation, Barrackpore, Kolkata-700121, West Bengal, India ' Department of Computer Science and Engineering, Jadavpur University, Jadavpur, Kolkata-700032, West Bengal, India ' Department of Computer Science and Engineering, Jadavpur University, Jadavpur, Kolkata-700032, West Bengal, India ' Department of Computer Science and Engineering, Jadavpur University, Jadavpur, Kolkata-700032, West Bengal, India ' Department of Computer Science and Engineering, Jadavpur University, Jadavpur, Kolkata-700032, West Bengal, India

Abstract: The secured data communication over internet is the most important concern nowadays. Our main aim is to build an apparently attack resistant encryption model. Session key may be one solution where new encryption key is used in every session but that needs key exchange prior to every communication. Common solution is, the new key be the function of the previous key and previous plain-text. Here after every communication one needs to extract the next session key and to remember till the next communication. In this paper, we have proposed a scheme where session key is the function of a secret key and the current plain-text. Thus in each session the encryption key is changing but there is no need to extract and remember the next session key. Moreover, we have used double encryption technique and shown that our scheme is better against crypto-analysis than other existing schemes like DES, AES.

Keywords: symmetric cryptography; session key; advanced encryption standard; AES; secure hash algorithm; SHA; transpose cipher; robust cryptography; network security; double encryption.

DOI: 10.1504/IJESDF.2015.067990

International Journal of Electronic Security and Digital Forensics, 2015 Vol.7 No.1, pp.30 - 40

Received: 25 Mar 2014
Accepted: 16 Oct 2014

Published online: 12 Mar 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article