SlideShare a Scribd company logo
A new approach towards
encryption schemes:
Byte- Rotation encryption
algorithm
2/18/2017 1
Contents
 What is BREA?
 Previous used encryption algorithms
 BREA Algorithm
 Steps
 Example
 BREA with parallel encryption model
 Byte rotation with “CBC encryption algorithm”
 Advantages
 Future enchancement
 Conclusion
 Refrences
2/18/2017 2
What is BREA?
oByte Rotation Encryption algorithm(BREA)
(developed in 2012) is a symmetric key block
cipher algorithm which is applied on different
blocks of plaintext and executes in parallel
manner through multithreading concept of
single processor system.
oMultithreading is a technique at which a single
set of code can be used by different processors
at different stages of execution.
2/18/2017 3
Previous used algorithms
oEarlier many researchers have proposed
various encryption algorithms such as AED,DES,
Triple DES,RSA, Blowfish etc.
oSome of them are most popular in achieving
data security at a great exent like AES and
Blowfish.
oWith increase in security level, the time and
complexity of algorithm is also increased and
this is the major cause of decreasing the speed
and efficiency of encryption system.
2/18/2017 4
2/18/2017 5
BREA
Symmetric Key
Algorithm
Block Cipher
Encryption
Byte Rotation Encryption
Algorithm
2/18/2017 6
It is symmetric key block cipher
algorithm
Each block size of 16 bytes
Size of Matrix is 16 bytes
Value of matrix are randomly selected
and are ranging from 1-26
Mono alphabetic substitution concept is
followed
Byte rotation technique is used
Steps
2/18/2017 7
1. The letters of the alphabet are assigned numerical
values from 1 to 26 in sequence i.e. A,B,C,D,…,Y,Z
assigned numerical values 1,2,3,….26 respectively.
2. The plaintext is partitioned into fixed-length
blocks of size 16 bytes (128 bits) each. These
blocks are represented by a matrix Mp.
3. The values of key matrix (K) are randomly selected
from the range 1 to 26. The size of key matrix is
equivalent to the block size of plaintext i.e. 16
bytes. K=[K1,K2,K3,………….K16].
4. Calculate the transpose matrix of plaintext block
matrix (MP), which is denoted by (MP)T.
Continue…
2/18/2017 8
5. Calculate the encrypted key matrix Ke using the
following formula:
Ke = K mod 2
6. Add both the matrices MPT and Ke and the resultant
matrix is denoted by CPK.
CPK = MPT + Ke
7. Rotate the first three rows horizontally of CPK matrix
such that rotate one byte from first row, rotate two
bytes from second row, rotate three bytes from third
row and fourth remains unchanged. The resultant
matrix is denoted by Chr.
8. Rotate first three columns vertically of Chr matrix such
that rotate one byte from first column, rotate two
bytes from second column, rotate three bytes from
third column and fourth column remains unchanged.
The resultant matrix is denoted by CVR.
Continue ….
2/18/2017 9
9. Replace numeric values of CVR matrix by their
corresponding letters and if 36 exist in CVR matrix, it
is replaced by special character #. The resultant
matrix is denoted by Ce.
EXPLANATION(1)
2/18/2017 10
EXPLANATION(2)
2/18/2017 11
FLOWCHART
2/18/2017 12
Byte rotation with “CBC encryption
algorithm”
2/18/2017 13
2/18/2017 14
Advantages
Very
Secure
Require
less
computer
resources
No
complex
calculation
Very Fast
Future Enhancement
2/18/2017 15
• The system can be easily modified to
accept any encryption algorithm which
would be framed in future.
• Moreover, currently concentration on the
next work which adopts Parallelism
through multiprocessor system where
various encryption algorithms can run in
parallel environment which enhances the
performance and speed of
Encryption/Decryption process.
Conclusion
2/18/2017 16
• The concept of block wise parallel
encryption using multithreading
technique enhances the speed of
encryption system. The system which use
“BREA” provides enough security. Thus
the system is justified for its use in
securing files.
References
2/18/2017 17
• [1] MAHENDRAN R “BYTE ROTATION WITH CBC
ENCRYPTION ALGORITHM” International Journal
of Machine and Construction Engineering
Volume 1 Issue 1 Aug 2014.
• [2] Nidhi Gouttam “Implementation Of
Simulation Of Byte Rotation Encryption
Algorithm” INTERNATIONAL JOURNAL OF
TECHNOLOGY ENHANCEMENTS AND EMERGING
ENGINEERING RESEARCH, VOL 2, ISSUE 5 ISSN
2347-4289
• [3] Sunita Bhatti & Prof. S. K. Sharma, “Block
Wise Parallel Encryption through Multithreading
Concept”, Research Paper published in
Aishwarya Research Communication Journal
(ISSN: 0975-3613) Vol. 3, August 2011.
2/18/2017 18
•THANK YOU
Ad

Recommended

Byte rotation encryption algorithm
Byte rotation encryption algorithm
Shikha Jain
 
Block Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
Modes of Operation
Modes of Operation
Showkot Usman
 
Block cipher modes of operations
Block cipher modes of operations
AkashRanjandas1
 
Information and data security block cipher operation
Information and data security block cipher operation
Mazin Alwaaly
 
Hash Function(Grostl) and Contex Hull Research paper
Hash Function(Grostl) and Contex Hull Research paper
SAIFUR RAHMAN
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
Mazin Alwaaly
 
182
182
Balaji Ravi
 
Class3
Class3
ankitasinghbsc
 
Data Encryption Standard
Data Encryption Standard
Adri Jovin
 
Modern symmetric cipher
Modern symmetric cipher
Rupesh Mishra
 
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
praveenaS25
 
Information and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphers
Vaibhav Khanna
 
Network Security Lec4
Network Security Lec4
Federal Urdu University
 
Block Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
Narrow bicliquesppt
Narrow bicliquesppt
Rifad Mohamed
 
Unit 2
Unit 2
KRAMANJANEYULU1
 
Block Cipher
Block Cipher
Brandon Byungyong Jo
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
SrideviM4
 
13528 l8
13528 l8
ridhika_gulati
 
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Des lecture
Des lecture
ANIKET UTTAM
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Comparative analysis on different DES model
Comparative analysis on different DES model
Saeed Siddik
 
Ciphers
Ciphers
phanleson
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
Post quantum cryptography
Post quantum cryptography
Samy Shehata
 
cryptography Application of linear algebra
cryptography Application of linear algebra
Sami Ullah
 
Hash function
Hash function
Salman Memon
 
Linux booting process
Linux booting process
Prashant Hegde
 

More Related Content

What's hot (20)

Class3
Class3
ankitasinghbsc
 
Data Encryption Standard
Data Encryption Standard
Adri Jovin
 
Modern symmetric cipher
Modern symmetric cipher
Rupesh Mishra
 
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
praveenaS25
 
Information and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphers
Vaibhav Khanna
 
Network Security Lec4
Network Security Lec4
Federal Urdu University
 
Block Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
Narrow bicliquesppt
Narrow bicliquesppt
Rifad Mohamed
 
Unit 2
Unit 2
KRAMANJANEYULU1
 
Block Cipher
Block Cipher
Brandon Byungyong Jo
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
SrideviM4
 
13528 l8
13528 l8
ridhika_gulati
 
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Des lecture
Des lecture
ANIKET UTTAM
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Comparative analysis on different DES model
Comparative analysis on different DES model
Saeed Siddik
 
Ciphers
Ciphers
phanleson
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
Post quantum cryptography
Post quantum cryptography
Samy Shehata
 
cryptography Application of linear algebra
cryptography Application of linear algebra
Sami Ullah
 
Data Encryption Standard
Data Encryption Standard
Adri Jovin
 
Modern symmetric cipher
Modern symmetric cipher
Rupesh Mishra
 
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
NETWORK SECURITY,S.praveena,II-M.sc(computer science),Bon secours college for...
praveenaS25
 
Information and network security 18 modern techniques block ciphers
Information and network security 18 modern techniques block ciphers
Vaibhav Khanna
 
M.Sridevi II-M.Sc (computer science)
M.Sridevi II-M.Sc (computer science)
SrideviM4
 
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana
 
Comparative analysis on different DES model
Comparative analysis on different DES model
Saeed Siddik
 
Information and data security advanced encryption standard (aes)
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
Post quantum cryptography
Post quantum cryptography
Samy Shehata
 
cryptography Application of linear algebra
cryptography Application of linear algebra
Sami Ullah
 

Viewers also liked (20)

Hash function
Hash function
Salman Memon
 
Linux booting process
Linux booting process
Prashant Hegde
 
Disk
Disk
Krishna Yadav Kyadav308
 
Raid_intro.ppt
Raid_intro.ppt
webhostingguy
 
Cryptography by Epul
Cryptography by Epul
Agate Studio
 
Cryptography
Cryptography
pravin pandey
 
Volatile memory
Volatile memory
Simon Paul
 
Forensic imaging tools
Forensic imaging tools
Dr. Richard Adams
 
Linux booting procedure
Linux booting procedure
Dhaval Kaneria
 
Message digest & digital signature
Message digest & digital signature
Dinesh Kodam
 
Partitioning a Hard Drive
Partitioning a Hard Drive
Jamaica Olazo
 
Memory types
Memory types
Piyush Rochwani
 
Raid(redundant array of independent disks).
Raid(redundant array of independent disks).
ali torabi
 
Linux booting Process
Linux booting Process
Gaurav Sharma
 
Memory
Memory
Nitesh Kumar Pandey
 
Linux installation and booting process
Linux installation and booting process
Siddharth Jain
 
Basic information about Computer memory
Basic information about Computer memory
Ramesh Pant
 
international data encryption Algoritm (IDEA) and RC-4
international data encryption Algoritm (IDEA) and RC-4
sikindir
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
Vittorio Giovara
 
Unit V network management and security
Unit V network management and security
sangusajjan
 
Cryptography by Epul
Cryptography by Epul
Agate Studio
 
Volatile memory
Volatile memory
Simon Paul
 
Linux booting procedure
Linux booting procedure
Dhaval Kaneria
 
Message digest & digital signature
Message digest & digital signature
Dinesh Kodam
 
Partitioning a Hard Drive
Partitioning a Hard Drive
Jamaica Olazo
 
Raid(redundant array of independent disks).
Raid(redundant array of independent disks).
ali torabi
 
Linux booting Process
Linux booting Process
Gaurav Sharma
 
Linux installation and booting process
Linux installation and booting process
Siddharth Jain
 
Basic information about Computer memory
Basic information about Computer memory
Ramesh Pant
 
international data encryption Algoritm (IDEA) and RC-4
international data encryption Algoritm (IDEA) and RC-4
sikindir
 
Block Cipher Modes of Operation And Cmac For Authentication
Block Cipher Modes of Operation And Cmac For Authentication
Vittorio Giovara
 
Unit V network management and security
Unit V network management and security
sangusajjan
 
Ad

Similar to Byte Rotation Algorithm (20)

Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)
SoumyaBhattacharyya14
 
Rass presentation
Rass presentation
Shalini Guha
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
aritraranjan
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
Iaetsd Iaetsd
 
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET Journal
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
Eswar Publications
 
03 UNIT-2.pdf
03 UNIT-2.pdf
31ABINESHWARANG
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)
Sam Bowne
 
CipherKey Algorithm
CipherKey Algorithm
ijtsrd
 
Cryptography using python
Cryptography using python
KaushikRamabhotla
 
Computer security module 2
Computer security module 2
Deepak John
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
IJERA Editor
 
Enhanced Hybrid Encryption Algorithm
Enhanced Hybrid Encryption Algorithm
Shivaditya Jatar
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
IJNSA Journal
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptx
RavikumarVadana
 
Fundamentals of Information Encryption
Fundamentals of Information Encryption
Amna Magzoub
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)
SoumyaBhattacharyya14
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
aritraranjan
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
Iaetsd Iaetsd
 
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET Journal
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
Eswar Publications
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)
Sam Bowne
 
CipherKey Algorithm
CipherKey Algorithm
ijtsrd
 
Computer security module 2
Computer security module 2
Deepak John
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
IJERA Editor
 
Enhanced Hybrid Encryption Algorithm
Enhanced Hybrid Encryption Algorithm
Shivaditya Jatar
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
IJNSA Journal
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
IJERA Editor
 
Cyber Security Part-2.pptx
Cyber Security Part-2.pptx
RavikumarVadana
 
Fundamentals of Information Encryption
Fundamentals of Information Encryption
Amna Magzoub
 
Ad

Recently uploaded (20)

Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
 
Structured Programming with C++ :: Kjell Backman
Structured Programming with C++ :: Kjell Backman
Shabista Imam
 
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
SAMEER VISHWAKARMA
 
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 
20CE404-Soil Mechanics - Slide Share PPT
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
rr22001247
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Solar thermal – Flat plate and concentrating collectors .pptx
Solar thermal – Flat plate and concentrating collectors .pptx
jdaniabraham1
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
 
Fatality due to Falls at Working at Height
Fatality due to Falls at Working at Height
ssuserb8994f
 
How to Un-Obsolete Your Legacy Keypad Design
How to Un-Obsolete Your Legacy Keypad Design
Epec Engineered Technologies
 
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Rapid Prototyping for XR: Lecture 2 - Low Fidelity Prototyping.
Mark Billinghurst
 
DESIGN OF REINFORCED CONCRETE ELEMENTS S
DESIGN OF REINFORCED CONCRETE ELEMENTS S
prabhusp8
 
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Rapid Prototyping for XR: Lecture 1 Introduction to Prototyping
Mark Billinghurst
 
System design handwritten notes guidance
System design handwritten notes guidance
Shabista Imam
 
Structured Programming with C++ :: Kjell Backman
Structured Programming with C++ :: Kjell Backman
Shabista Imam
 
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
Deep Learning for Natural Language Processing_FDP on 16 June 2025 MITS.pptx
resming1
 
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
MATERIAL SCIENCE LECTURE NOTES FOR DIPLOMA STUDENTS
SAMEER VISHWAKARMA
 
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
FUNDAMENTALS OF COMPUTER ORGANIZATION AND ARCHITECTURE
Shabista Imam
 
20CE404-Soil Mechanics - Slide Share PPT
20CE404-Soil Mechanics - Slide Share PPT
saravananr808639
 
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
LECTURE 7 COMPUTATIONS OF LEVELING DATA APRIL 2025.pptx
rr22001247
 
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Tally.ERP 9 at a Glance.book - Tally Solutions .pdf
Shabista Imam
 
machine learning is a advance technology
machine learning is a advance technology
ynancy893
 
AI_Presentation (1). Artificial intelligence
AI_Presentation (1). Artificial intelligence
RoselynKaur8thD34
 
Solar thermal – Flat plate and concentrating collectors .pptx
Solar thermal – Flat plate and concentrating collectors .pptx
jdaniabraham1
 
Structural Wonderers_new and ancient.pptx
Structural Wonderers_new and ancient.pptx
nikopapa113
 
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
IPL_Logic_Flow.pdf Mainframe IPLMainframe IPL
KhadijaKhadijaAouadi
 
Fatality due to Falls at Working at Height
Fatality due to Falls at Working at Height
ssuserb8994f
 
Industry 4.o the fourth revolutionWeek-2.pptx
Industry 4.o the fourth revolutionWeek-2.pptx
KNaveenKumarECE
 
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
Tesla-Stock-Analysis-and-Forecast.pptx (1).pptx
moonsony54
 

Byte Rotation Algorithm

  • 1. A new approach towards encryption schemes: Byte- Rotation encryption algorithm 2/18/2017 1
  • 2. Contents  What is BREA?  Previous used encryption algorithms  BREA Algorithm  Steps  Example  BREA with parallel encryption model  Byte rotation with “CBC encryption algorithm”  Advantages  Future enchancement  Conclusion  Refrences 2/18/2017 2
  • 3. What is BREA? oByte Rotation Encryption algorithm(BREA) (developed in 2012) is a symmetric key block cipher algorithm which is applied on different blocks of plaintext and executes in parallel manner through multithreading concept of single processor system. oMultithreading is a technique at which a single set of code can be used by different processors at different stages of execution. 2/18/2017 3
  • 4. Previous used algorithms oEarlier many researchers have proposed various encryption algorithms such as AED,DES, Triple DES,RSA, Blowfish etc. oSome of them are most popular in achieving data security at a great exent like AES and Blowfish. oWith increase in security level, the time and complexity of algorithm is also increased and this is the major cause of decreasing the speed and efficiency of encryption system. 2/18/2017 4
  • 6. Byte Rotation Encryption Algorithm 2/18/2017 6 It is symmetric key block cipher algorithm Each block size of 16 bytes Size of Matrix is 16 bytes Value of matrix are randomly selected and are ranging from 1-26 Mono alphabetic substitution concept is followed Byte rotation technique is used
  • 7. Steps 2/18/2017 7 1. The letters of the alphabet are assigned numerical values from 1 to 26 in sequence i.e. A,B,C,D,…,Y,Z assigned numerical values 1,2,3,….26 respectively. 2. The plaintext is partitioned into fixed-length blocks of size 16 bytes (128 bits) each. These blocks are represented by a matrix Mp. 3. The values of key matrix (K) are randomly selected from the range 1 to 26. The size of key matrix is equivalent to the block size of plaintext i.e. 16 bytes. K=[K1,K2,K3,………….K16]. 4. Calculate the transpose matrix of plaintext block matrix (MP), which is denoted by (MP)T.
  • 8. Continue… 2/18/2017 8 5. Calculate the encrypted key matrix Ke using the following formula: Ke = K mod 2 6. Add both the matrices MPT and Ke and the resultant matrix is denoted by CPK. CPK = MPT + Ke 7. Rotate the first three rows horizontally of CPK matrix such that rotate one byte from first row, rotate two bytes from second row, rotate three bytes from third row and fourth remains unchanged. The resultant matrix is denoted by Chr. 8. Rotate first three columns vertically of Chr matrix such that rotate one byte from first column, rotate two bytes from second column, rotate three bytes from third column and fourth column remains unchanged. The resultant matrix is denoted by CVR.
  • 9. Continue …. 2/18/2017 9 9. Replace numeric values of CVR matrix by their corresponding letters and if 36 exist in CVR matrix, it is replaced by special character #. The resultant matrix is denoted by Ce.
  • 13. Byte rotation with “CBC encryption algorithm” 2/18/2017 13
  • 15. Future Enhancement 2/18/2017 15 • The system can be easily modified to accept any encryption algorithm which would be framed in future. • Moreover, currently concentration on the next work which adopts Parallelism through multiprocessor system where various encryption algorithms can run in parallel environment which enhances the performance and speed of Encryption/Decryption process.
  • 16. Conclusion 2/18/2017 16 • The concept of block wise parallel encryption using multithreading technique enhances the speed of encryption system. The system which use “BREA” provides enough security. Thus the system is justified for its use in securing files.
  • 17. References 2/18/2017 17 • [1] MAHENDRAN R “BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM” International Journal of Machine and Construction Engineering Volume 1 Issue 1 Aug 2014. • [2] Nidhi Gouttam “Implementation Of Simulation Of Byte Rotation Encryption Algorithm” INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 5 ISSN 2347-4289 • [3] Sunita Bhatti & Prof. S. K. Sharma, “Block Wise Parallel Encryption through Multithreading Concept”, Research Paper published in Aishwarya Research Communication Journal (ISSN: 0975-3613) Vol. 3, August 2011.