scispace - formally typeset
Open AccessJournal ArticleDOI

Gmdes: a graph based modified data encryption standard algorithm with enhanced security

Debajit Sensarma, +1 more
- 25 Mar 2014 - 
- Vol. 03, Iss: 03, pp 653-660
TLDR
The algorithm is graph automorphism based partial symmetric key algorithm and it is not fully depended on secret key and produces different cipher text by applying same key on the same plain text.
Abstract
Cryptography is one of the prime techniques of secured symbolic data transmission over any communication channel. Security is the most challenging and essential aspects in today’s internet and network applications. Thus, design of a secure encryption algorithm is very necessary which can protect the unauthorized attacks. An encryption algorithm is computationally secure if it cannot be intruded with the standard resources. The algorithm proposed here is graph based. Its efficiency surpasses the standard DES algorithm in general. Graphs can be used for designing block ciphers, stream ciphers or public-key ciphers. The algorithm is graph automorphism based partial symmetric key algorithm and it is not fully depended on secret key and produces different cipher text by applying same key on the same plain text.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Medical Image Encryption: An Application for Improved Padding Based GGH Encryption Algorithm

TL;DR: Padding GGH approach has improved UACI, NPCR, and Avalanche by almost 100%, 35%, and 45%, respectively, in comparison to the standard GGH algorithm, and increasing the avalanche effect of more than 50% is a promising achievement in relation to the increased complexities of the proposed method in terms of encryption and decryption processes.
Book ChapterDOI

A Vulnerability Analysis Mechanism Utilizing Avalanche Attack Model for Dependency-Based Systems

TL;DR: The results prove that the proposed method is superior than using the uniform search method, and the maximization/minimization problem is successfully solved, as the results locate the desired objectives that support the ingenuity of the proposed model.
Journal ArticleDOI

An Algorithmic Approach for Encryption using Graph Labeling

TL;DR: The suggested algorithmic approach speaks a new encryption technique to encode and decode the message very securely using graph labeling to secure the information.
Journal ArticleDOI

Thermal Comfort Study of a Classroom in Northern Malaysia: A CFD Approach

TL;DR: In this article, a study was conducted to assess the thermal comfort in one of the classrooms of a university located in the northern most part of Malaysia, where the particular classroom was randomly chosen from a total of 4 classrooms of the same size and condition.
Journal Article

Application of Cosmos's law of Merge and Split for Data Encryption

TL;DR: An encryption technique with time complexity of O(1) that exploits the dynamic node fusion property of graph theory that will be completely able to resist the illicit actions of intruders with low computational efforts as well as it reduces the network load on packet transmission.
References
More filters
Book

The Art of Computer Programming

TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Book

Algebraic Graph Theory

TL;DR: The Laplacian of a Graph and Cuts and Flows are compared to the Rank Polynomial.

The Art in Computer Programming

Andrew Hunt, +1 more
TL;DR: Here the authors haven’t even started the project yet, and already they’re forced to answer many questions: what will this thing be named, what directory will it be in, what type of module is it, how should it be compiled, and so on.
Journal Article

The On-Line Encyclopedia of Integer Sequences.

TL;DR: The On-Line Encyclopedia of Integer Sequences (OEIS) as mentioned in this paper is a database of 13,000 number sequences and is freely available on the Web (http://www.att.com/~njas/sequences/) and is widely used.
Book

Cryptography and Network Security: Principles and Practice

TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Related Papers (5)