International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)

IJTEEE >> Volume 2 - Issue 5, May 2014 Edition

International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289

Implementation Of Simulation Of Byte Rotation Encryption Algorithm

[Full Text]



Nidhi Gouttam



Keywords: Encryption, Decryption, key, BREA, Plain text, cipher text.



ABSTRACT: In this paper, we have imported some innovative advancement to the byte rotation encryption algorithm which is more secure and fast. The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. Within the last decade, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has a significant value, either directly or indirectly, which requires protection. The algorithms uniquely define the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. Performance and security level is the main characteristics that differentiate one encryption algorithm from another. We have simulate a new encryption algorithm (developed in 2012) “Byte – Rotation Encryption Algorithm (BREA)” with “Parallel Encryption Model” which enhances the security as well as speed of the encryption scheme. The BREA is applied on different blocks of plaintext and executes in parallel manner through multithreading concept of single processor system.



[1]. http:/www.laits.utexas.edu/anorman/BUS.FOR/course.mat/SSim/history.html

[2]. www.iaeng.org/publication/WCECS2012/WCECS2012_pp979-982.pdf‎ Himanshu Gupta, “Multiphase Encryption Technique”, An Article Amity UniversityU.P.March2011http://en.wikipedia.org/wiki/A_New_Concept_for_Multiphase_Encryption_Techniques

[3]. www.aect.cuhk.edu.hk/ect7010/Materials/Lecture/Lec4.pdf‎

[4]. http://www.banasthali.org/banasthali/wcms/en/home/

[5]. www.amazon.com/Introduction.Cryptography/dp/1584885513

[6]. www.springer.com/computer/cryptology/978-3-540-49243-6

[7]. hackme.wablab.com/cryptography-two-basic-cryptographic-principles

[8]. ssmy.safaribooksonline.com/book/certification/cryptography/sect1- 99‎

[9]. http:/en.wikipedia.org/wiki/Multithreading

[10]. Walter Tuchman, “A brief history of the data encryption standard", ACM Press/Addison-Wesley Publishing Co. NY, USA, pp. 275–280, 1997

[11]. Sunita Bhati & Prof. S. K. Sharma, “Block Wise Parallel Encryption through Multithreading Concept”, Research Paper published in Aishwarya Research Communication Journal (ISSN: 0975-3613) Vol. 3, August 2011, pp. 100-106.Proceedings of the World Congress on Engineering and Computer Science.