Abstract
Cryptography is an important component in securing and protecting sensitive and confidential data. It is a technique of encrypting data, hiding the process and produced a ciphered text. The Data Encryption Standard (DES) algorithm is considerably known for its branded encryption/decryption technique. To explore the advantage of its recognized cycle process and ciphertext representation. This paper presents the new algorithm based on mixed technique by substituting reverse scheme, swapping and bit-manipulation. This encryption technique is a concept that combines selected cryptographic technique that can reduce and save time processing encryption operation, offers simplicity, and extended mixed encryption key generation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
History of Encryption. SANS Institute of InfoSec Reading Room. Copyright SANS Institute. https://www.sans.org/reading-room/whitepapers/vpns/history-encryption-730
Rhee, M.Y.: Internet Security. Crytographic principles, algorithms, and protocols, p. 57
Data Encryption Standard. http://www.tutorialspoint.com
Playfair Cipher. http://practicalcryptography.com/ciphers/playfair-cipher/#references
Introduction to Blowfish. SplashID Safe Password Vault. http://www.splashdata.com/splashid/blowfish.htm
Schneier, B.: The Blowfish Encryption Algorithm. https://www.schneier.com/cryptography/blowfish/
BLOWFISHENC: Blowfish Encryption Algorithm. iitd.vlab.co.in
Internet Security, Chap. 4 [ppt] slide 45–46
Xijun LI, A Summary of Bit Manipulation. https://xijunlee.github.io/2017/04/01/efficiently/
Bansal, S., Shrivasta, R.: The IUP Journal of Computer sciences, vol. V, no. 4 (2011)
Bhagat, P., Satpute, K., Palekar, V.: Reverse encryption algorithm: a technique for encryption & decryption. Int. J. Latest Trends Eng. Technol. (IJLTET) 2(1), 91 (2013)
Lee, S., Park, T., Lee, D., Nam, T., Kim, S.: Chaotic order preserving encryption for efficient and secure queries on databases. IEICE Trans. Inf. Syst. 92, 207–217 (2009)
Ceselli, A., Damiani, E., Vimercati, S.D.C.D., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inf. Syst. Secur. 8(1), 119–152 (2005)
Damiani, E., Di Vimercati, S.D.C., Finetti, M., Paraboschi, S., Samarati, P., Jajodia, S.: Implementation of a storage mechanism for untrusted DBMSs. In: IEE Security in Storage Workshop 2003, pp. 38–46 (2003)
Hacigümüş, H., Iyer, B., Mehrotra, S.: Ensuring the integrity of encrypted databases in the database-as-a-service model. In: DBSec 17th Annual Working Conference on Data and Application Security, Kluwer, pp. 61–74 (2003)
Tang, Q., Ji, D.: Verifiable attribute based encryption. Int. J. Netw. Secur. 10(2), 114–120 (2010)
Kumar, Y., Joshi, R., Mandavi, T., Bharti, S., Rathour, R.: Enhancing the security of data using DES algorithm along with substitution technique. Int. J. Eng. Comput. Sci. 5(10), 18395–18398 (2016). www.ijecs.in, ISSN 2319-7242
Jain, A., Dedia, R., Ppatil, A.: Enhancing the security of caesar cipher substitution method using a randomized approach for more secure communication. Int. J. Comput. Appl. 129(13), 6–11
Vyas, B., Vajpayee, A.: Local data security thought encryption. IJSART 2(8), 10–15 (2016)
Alanazi, H.O., Zaidan, B.B., Zaidan, A.A., Jalab, H.A., Shabbir, M., Al-Nabhani, Y.: New comparative study between DES, 3DES and AES within Nine factors. J. Comput. 2(3), 152–157 (2010)
Ebrahim, M., Khan, S., Khalid, U.B.: Symmetric algorithm survey: a comparative analysis. Int. J. Comput. Appl. 61(20), 12–19 (2013). https://arxiv.org/ftp/arxiv/papers/1405/1405.0398.pdf
Fathy, A., Tarrad, I.F., Hamed, H.F.A., Awad, A.I.: Advanced encryption standard algorithm: issues and implementation aspects. In: Hassanien, A.E., Salem, AB.M., Ramadan, R., Kim, T. (eds.) Advanced Machine Learning Technologies and Applications, AMLTA 2012. Communications in Computer and Information Science, vol 322. Springer, Heidelberg (2012)
Daemen, J., Rijmen, V.: The block cipher Rijndael. In: Smart Card Research and Applications. LNCS, vol. 1820, pp. 288–296. Springer
Pitchaiah, M., Daniel, P., Praveen: Implementation of advanced encryption standard algorithm. Int. J. Sci. Eng. Res. 3(3), 1–6 (2012). https://doi.org/10.15662/IJAREEIE.2016.0506068
Katkade, P., Phade, G.M.: Application of AES algorithm for data security in serial communication. In: IEEE International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, August 2016
Binary Coded Decimal. ElectronicsTutorials. https://www.electronics-tutorials.ws/binary/binary-coded-decimal.html
Acknowledgment
This work (Grants No. C0515862) was supported by Business for Cooperative R&D between Industry, Academy, and Research Institute funded Korea Small and Medium Business Administration in 2017. Thank you to Bicol University, Technological Institute of the Philippines for the support given.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Balilo, B.B., Gerardo, B.D., Byun, Y. (2019). CipherBit192: Encryption Technique for Securing Data. In: Lee, R. (eds) Applied Computing and Information Technology. ACIT 2018. Studies in Computational Intelligence, vol 788. Springer, Cham. https://doi.org/10.1007/978-3-319-98370-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-98370-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98369-1
Online ISBN: 978-3-319-98370-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)