Formation of an Improved RC6 (IRC6) Cryptographic Algorithm
Main Article Content
Abstract
IRC6 cryptosystem is an improvement on RC6 which was developed in the course of this research to guard against crypto-analytical attack. This is achieved by doubling its security at little or no computational cost. RC6 is an improvement on RC5, and RC5 was an improvement on RC4. IRC6 is designed to meet the requirements of increased security and better performance.
Object-oriented analysis and design methodology (OOADM) together with Java programming and Development technologies were used to implement both Normal RC6 algorithm and improved RC6 (IRC6) cryptographic algorithm in this research in order to achieve the research goal which is to show the significant improvement of IRC6 over normal RC6 by carrying out performance evaluations of the two algorithms. The developed IRC6 was also evaluated to have transparent cipher-text and thereby found to survive any crypto-analytical attack.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
E. Biham and A. Shamir, “Differential Cryptanalysis of the Data Encryption Standardâ€.
Springer-Verlag, New York, zbMATH/Google Scholar. 1993
S. Contini, R. L. Rivest, M. J. B. Robshaw and Y. L. Yin, “The Security of the RC6 Block
Cipherâ€. v1.0. Available at www.rsa.com/rsalabs/aes/.Google Scholar, 1998.
A. Biryukov and E. Kushilevitz, “Improved cryptanalysis of RC5â€. In K. Nyberg, editor,
Advances in Cryptology-Eurocrypt, vol. 1403 Lecture Notes in Computer Science, pages 85–99, Springer Verlag.Google Scholar, 1998
B. S. Kaliski and Y. L. Yin, “On differential and linear cryptanalysis of the RC5 encryption
Algorithmâ€. In D. Coppersmith, editor, Advances in Cryptology-Crypto, Vol. 963 of Lecture Notes in Computer Science, pages 171–184, Springer Verlag.Google Scholar, 1995.
R. L. Rivest, “The RC5 encryption algorithm. In B. Preneel, editor, Fast Software
Encryptionâ€, Vol. 1008 of Lecture Notes in Computer Science, pages 86-96. Springer Verlag. 1995.
H. H. Jian and L. Yang, “A block encryption algorithm combined with the Logistic
mapping and SPN structureâ€. 2nd International Conference on Industrial and Information Systems (IIS), Vol. 2. 2010.
L. R. Ronald, M.J.B Robshaw, R. Sidney and Y.L. Yin, “The RC6 Block Cipher, Version 1.1. 1998.
K. Aggarwal and H. K. Verma “Hash RC6 Variable length Hash algorithm using RC6â€,
International Conference on Computer Engineering and Applications (ICACEA). 2015
T. Gunasundari and K. Elangovan, “A Comparative Survey on Symmetric Key Encryption Algorithmsâ€, International Journal of Computer Science and Mobile Applications, Vol.2 Issue. 2, 2014.
H. K. Gil, N. K. Jong, Y. C. Gyeong, “An improved RC6 algorithm with the same
structure of encryption and decryption, 11th International Conference on Advanced Communication Technology, ICACT2009, Vol. 2. 2009.