Formation of an Improved RC6 (IRC6) Cryptographic Algorithm

Main Article Content

Edward Onyebueke Agu
Michael O. Ogar
Anthony O. Okwori

Abstract

IRC6 cryptosystem is an improvement on RC6 which was developed in the course of this research to guard against crypto-analytical attack. This is achieved by doubling its security at little or no computational cost. RC6 is an improvement on RC5, and RC5 was an improvement on RC4. IRC6 is designed to meet the requirements of increased security and better performance.

Object-oriented analysis and design methodology (OOADM) together with Java programming and Development technologies were used to implement both Normal RC6 algorithm and improved RC6 (IRC6) cryptographic algorithm in this research in order to achieve the research goal which is to show the significant improvement of IRC6 over normal RC6 by carrying out performance evaluations of the two algorithms. The developed IRC6 was also evaluated to have transparent cipher-text and thereby found to survive any crypto-analytical attack.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biographies

Edward Onyebueke Agu, Federal University Wukari, Taraba State, Nigeria

Computer Science Department, Lecturer I.

Michael O. Ogar, Federal University Wukari, Taraba State, Nigeria.

Computer Science Department

Anthony O. Okwori, Federal University Wukari, Taraba State, Nigeria.

Computer Science Department

References

E. Biham and A. Shamir, “Differential Cryptanalysis of the Data Encryption Standardâ€.

Springer-Verlag, New York, zbMATH/Google Scholar. 1993

S. Contini, R. L. Rivest, M. J. B. Robshaw and Y. L. Yin, “The Security of the RC6 Block

Cipherâ€. v1.0. Available at www.rsa.com/rsalabs/aes/.Google Scholar, 1998.

A. Biryukov and E. Kushilevitz, “Improved cryptanalysis of RC5â€. In K. Nyberg, editor,

Advances in Cryptology-Eurocrypt, vol. 1403 Lecture Notes in Computer Science, pages 85–99, Springer Verlag.Google Scholar, 1998

B. S. Kaliski and Y. L. Yin, “On differential and linear cryptanalysis of the RC5 encryption

Algorithmâ€. In D. Coppersmith, editor, Advances in Cryptology-Crypto, Vol. 963 of Lecture Notes in Computer Science, pages 171–184, Springer Verlag.Google Scholar, 1995.

R. L. Rivest, “The RC5 encryption algorithm. In B. Preneel, editor, Fast Software

Encryptionâ€, Vol. 1008 of Lecture Notes in Computer Science, pages 86-96. Springer Verlag. 1995.

H. H. Jian and L. Yang, “A block encryption algorithm combined with the Logistic

mapping and SPN structureâ€. 2nd International Conference on Industrial and Information Systems (IIS), Vol. 2. 2010.

L. R. Ronald, M.J.B Robshaw, R. Sidney and Y.L. Yin, “The RC6 Block Cipher, Version 1.1. 1998.

K. Aggarwal and H. K. Verma “Hash RC6 Variable length Hash algorithm using RC6â€,

International Conference on Computer Engineering and Applications (ICACEA). 2015

T. Gunasundari and K. Elangovan, “A Comparative Survey on Symmetric Key Encryption Algorithmsâ€, International Journal of Computer Science and Mobile Applications, Vol.2 Issue. 2, 2014.

H. K. Gil, N. K. Jong, Y. C. Gyeong, “An improved RC6 algorithm with the same

structure of encryption and decryption, 11th International Conference on Advanced Communication Technology, ICACT2009, Vol. 2. 2009.