Component of Symmetric key Algorithm TORDES with its Functionality (original) (raw)

2012, International Journal of Computational Engineering & Management

Abstract

In the absence of generally acknowledged metrics in the public area that could be used to compute and spell out cryptographic strength, a small operational group agreed to look at the possibility of developing an approach to cryptographic metrics The purpose of this paper is to report the results of the limited exploratory effort by above operational group that investigated the practicality of developing metrics for use in specifying the strength of cryptographic algorithms. TORDES deals with a small sample of selected symmetric cipher block encryption algorithms.

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

References (22)

  1. W. Stallings "Cryptography and network security principles and practice," Fourth edition, Prentice hall, 2007
  2. Gope, P., Ghosh, D., Chelluri, A.R.K. and Chattopadhyay,P., 2009. Multi Operator Delimiter based Data Encryption Standard (MODDES). ICCNT. Chennai,India, June 27 -29. 2009.
  3. Gope, P., Kaushik, A., Arora, K. and Kumar, N., 2010. XMODDES (Extended Multi Operator Delimiter Based Data Encryption Standard, Proceedings of the 2 nd International Conference on future Networks (ICFN) 2010, China, March, 2010, pp 399-403.
  4. NIST, "Advanced Encryption Standard Call", NIST, 1997.
  5. Bhushan , A., 2012. Transform Operator Random Generator Delimiter based Encryption Standard (TORDES). CCIT2012, Iraq.
  6. NIST, "Advanced Encryption Standard Call", NIST, 1997.
  7. National Bureau of standards-Data encryption Standard, FIPS Publications, 46. 1997. http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
  8. Tanenbaum, A. S., 2004. Computer Networks. New Delhi, Prentice Hall Inc.
  9. Charles, P.P. and Shari, P.L., 2008. Security in Computing, 4th edition, Prentice-Hall, lnc.
  10. Park Stephen K. and Keith W. Miller, "Random Number Generators Good ones are hard to find", Communications of the ACM, October 1988.
  11. Jing, Fan, and Zhu Xian. "Data Encryption by Two Keys." Information Science and Engineering (ICISE), 2009 1st International Conference on. IEEE, 2009.
  12. Special Publication 800-67 Rev. 1, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, http://csrc.nist.gov/publications/PubsSPs.html#800-67;
  13. FIPS Publication 197, Advanced Encryption Standard, http://csrc.nist.gov/publications/PubsFIPS.html#197;
  14. National Bureau of standards-Data encryption Standard, FIPS Publications, 46. 1997. http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
  15. "Basic Cryptographic Algorithms", an article available. www.itsc.state.md.us/oldsitelinfo/intemetSec-urity/Crypto/Cryto lntro.htm#Algorithms.
  16. van Tilborg, Henk C.A. (2000). Fundamentals of Cryptology.Kluwer Academic Publishers. pp. 3. ISBN 0-7923- 8675-3.
  17. Bhushan, A., Dulari, "TORDES-THE NEW SYMMETRIC KEY ALGORITHM", Journal of University of Anbar for Pure Science, Vol.6:NO.2: 2012. ISSN: 1991-8941. www.iasj.net
  18. KUI-HE YANG, SHI-JIN NIU, "Data Safe Transmission mechanism Based on Integrated Encryption Algorithm", 2009.
  19. Bhushan, A., TORDES A Symmetric key algorithm. LAP Publisher, 2012
  20. Twenty Second National Radio Science Conference (NRSC2005), RDEA Algorithm.
  21. Tingy uan Nie, Teng Zhang,, "A Study of DES & Blowfish Encryption Algorithm", 2009. Ajay Bhushan Ajay Bhushan is pursuing his master Degree in Information technology from Galgotias College of Engineering and Technology, Greater Noida (Uttar Pradesh) -INDIA. He is working as budding researcher in the field of data security. He has more than four year experience of software industry. He has also published, review papers in national and international journals and conference proceedings. Pawitar Dulari Pawitar Dulari received her M.Sc., M.Phil. and Ph.D. degree from Dr.
  22. B.R. Ambedkar University, Agra. She has her M.Sc. specialization in Electronics and Computational Physics. Her research areas include solid state physics and Data security. She is currently serving as Assistant Professor, Department of Physics, Govt. P.G. College, Indora (Himachal Prdaesh)-INDIA. She has published papers both in national and international journals and conferences.