Home // SECURWARE 2015, The Ninth International Conference on Emerging Security Information, Systems and Technologies // View article


Enhanced Authenticated Encryption Scheme

Authors:
Jamal Azzam

Keywords: encryption ; decryption ; hash function ; secret key

Abstract:
Cryptography is a vital part in information handling. In this paper we introduce a new scheme for encryption and authentication of the encrypted message. A random number is generated in each encryption process. Both of the random number and the secret key is used to generate the subkeys, a different subkey for each data block. To increase the secrecy, double permutation processes are executed on data blocks in the form of mutation and crossover. Mutation process to be performed at an arbitrary bit number, and crossover is performed at another bit number. Encryption of each data block is dependent on the previous encrypted data blocks, the secret key, and the random number. Also, one way hash function is generated to ensure authenticity of the message. The scheme proves its strength against cryptanalysis.

Pages: 21 to 30

Copyright: Copyright (c) IARIA, 2015

Publication date: August 23, 2015

Published in: conference

ISSN: 2162-2116

ISBN: 978-1-61208-427-5

Location: Venice, Italy

Dates: from August 23, 2015 to August 28, 2015