ParEncrypt: A Two-phased Encryption for Improved Security
Abstract
The
idea of encrypting text is alluring still as it is the most convenient and
straightforward means to shuffle text so as to make it unintelligible to
unintended third parties. We design and develop a novel symmetric encryption
algorithm ParEncrypt that implements a cascaded structure of known encryption
approaches: It first employs Feistel cipher to scramble the plaintext, then
applies a further step of substitution implemented via left and right
parentheses into the intermediate output to finalize the encryption. This two-phased
encryption provides enhanced security with the cost of slower paced
performance. We provide performance comparison of our design with common
benchmark encryption algorithms and see that ParEncrypt outperforms all others
with respect to the level of security. Additionally, our scheme offers an
additional benefit as our special way of encryption provides a significant
level of compression.
Keywords
References
- D. Kahil, M. A. Lebdeh, M. S. E. Dine and A. E. Rafhi, "Innovation of a secured transmitter/ receiver chain by creating a new encryption algorithm," 2017 Sensors Networks Smart and Emerging Technologies (SENSET), Beirut, 2017, pp. 1-3. doi: 10.1109/SENSET.2017.8125037 D. H. Kurniawan and R. Munir, "Double Chaining Algorithm: A secure symmetric-key encryption algorithm," 2016 International Conference On Advanced Informatics: Concepts, Theory And Application (ICAICTA), George Town, 2016, pp. 1-6. doi: 10.1109/ICAICTA.2016.7803097 Lewi, K., & Wu, D. J. (2016, October). Order-revealing encryption: New constructions, applications, and lower bounds. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1167-1178). ACM. Zhang, W., Lü, X., & Li, H. (2010). Efficient broadcast encryption scheme based on number theory research unit. Wuhan University Journal of Natural Sciences, 15(3), 247–250. https://doi.org/10.1007/s11859-010-0313-7 Negi, A., & Goyal, A. (2018). Optimizing Fully Homomorphic Encryption Algorithm using RSA and Diffie-Hellman Approach in Cloud Computing. J. Choi and Y. Kim, "An improved LEA block encryption algorithm to prevent side-channel attack in the IoT system," 2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA), Jeju, 2016, pp. 1-4. Kumar, N. S., Lakshmi, G. R., & Balamurugan, B. (2015). Enhanced attribute based encryption for cloud computing. Procedia Computer Science, 46, 689-696. M. Xin, "A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System," 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Xi'an, 2015, pp. 62-65. doi: 10.1109/CyberC.2015.9 “Blowfish,” Blowfish on GitHub. Michael Gilfix, Jun-2018. https://gist.github.com/eigenein/a56ce4d572484a582e14
Details
Primary Language
English
Subjects
Engineering
Journal Section
Research Article
Authors
Haneya Khan
This is me
Asim Sıddıquı
This is me
Fariha Islam
This is me
Elham Hamıd
This is me
Ebru Celıkel Cankaya
This is me
Publication Date
July 25, 2019
Submission Date
June 19, 2019
Acceptance Date
-
Published in Issue
Year 2019 Volume: 6