Research Article

ParEncrypt: A Two-phased Encryption for Improved Security

Volume: 6 July 25, 2019
  • Haneya Khan
  • Asim Sıddıquı
  • Fariha Islam
  • Elham Hamıd
  • Ebru Celıkel Cankaya
EN

ParEncrypt: A Two-phased Encryption for Improved Security

Abstract

The idea of encrypting text is alluring still as it is the most convenient and straightforward means to shuffle text so as to make it unintelligible to unintended third parties. We design and develop a novel symmetric encryption algorithm ParEncrypt that implements a cascaded structure of known encryption approaches: It first employs Feistel cipher to scramble the plaintext, then applies a further step of substitution implemented via left and right parentheses into the intermediate output to finalize the encryption. This two-phased encryption provides enhanced security with the cost of slower paced performance. We provide performance comparison of our design with common benchmark encryption algorithms and see that ParEncrypt outperforms all others with respect to the level of security. Additionally, our scheme offers an additional benefit as our special way of encryption provides a significant level of compression.

Keywords

References

  1. D. Kahil, M. A. Lebdeh, M. S. E. Dine and A. E. Rafhi, "Innovation of a secured transmitter/ receiver chain by creating a new encryption algorithm," 2017 Sensors Networks Smart and Emerging Technologies (SENSET), Beirut, 2017, pp. 1-3. doi: 10.1109/SENSET.2017.8125037 D. H. Kurniawan and R. Munir, "Double Chaining Algorithm: A secure symmetric-key encryption algorithm," 2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), George Town, 2016, pp. 1-6. doi: 10.1109/ICAICTA.2016.7803097 Lewi, K., & Wu, D. J. (2016, October). Order-revealing encryption: New constructions, applications, and lower bounds. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1167-1178). ACM. Zhang, W., Lü, X., & Li, H. (2010). Efficient broadcast encryption scheme based on number theory research unit. Wuhan University Journal of Natural Sciences, 15(3), 247–250. https://doi.org/10.1007/s11859-010-0313-7 Negi, A., & Goyal, A. (2018). Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie-Hellman Approach in Cloud Computing. J. Choi and Y. Kim, "An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system," 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Jeju, 2016, pp. 1-4. Kumar, N. S., Lakshmi, G. R., & Balamurugan, B. (2015). Enhanced attribute based encryption for cloud computing. Procedia Computer Science, 46, 689-696. M. Xin, "A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System," 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Xi'an, 2015, pp. 62-65. doi: 10.1109/CyberC.2015.9 “Blowfish,” Blowfish on GitHub. Michael Gilfix, Jun-2018. https://gist.github.com/eigenein/a56ce4d572484a582e14

Details

Primary Language

English

Subjects

Engineering

Journal Section

Research Article

Authors

Haneya Khan This is me

Asim Sıddıquı This is me

Fariha Islam This is me

Elham Hamıd This is me

Ebru Celıkel Cankaya This is me

Publication Date

July 25, 2019

Submission Date

June 19, 2019

Acceptance Date

-

Published in Issue

Year 2019 Volume: 6

APA
Khan, H., Sıddıquı, A., Islam, F., Hamıd, E., & Celıkel Cankaya, E. (2019). ParEncrypt: A Two-phased Encryption for Improved Security. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 6, 81-87. https://izlik.org/JA59LF58FJ