Home // SECURWARE 2015, The Ninth International Conference on Emerging Security Information, Systems and Technologies // View article
Enhanced Authenticated Encryption Scheme
Authors:
Jamal Azzam
Keywords: encryption ; decryption ; hash function ; secret key
Abstract:
Cryptography is a vital part in information handling. In this paper we introduce a new scheme for encryption and authentication of the encrypted message. A random number is generated in each encryption process. Both of the random number and the secret key is used to generate the subkeys, a different subkey for each data block. To increase the secrecy, double permutation processes are executed on data blocks in the form of mutation and crossover. Mutation process to be performed at an arbitrary bit number, and crossover is performed at another bit number. Encryption of each data block is dependent on the previous encrypted data blocks, the secret key, and the random number. Also, one way hash function is generated to ensure authenticity of the message. The scheme proves its strength against cryptanalysis.
Pages: 21 to 30
Copyright: Copyright (c) IARIA, 2015
Publication date: August 23, 2015
Published in: conference
ISSN: 2162-2116
ISBN: 978-1-61208-427-5
Location: Venice, Italy
Dates: from August 23, 2015 to August 28, 2015