CipherKey Algorithm
CipherKey Algorithm
Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
CipherKey Algorithm
Sweety Gone1, Kuldeep B. Vayadande2
1Master Student, Department of MCA, 2Assistant Professor,
1,2Jain Deemed-to-be University, Bengaluru, Karnataka, India
1. INTRODUCTION
In Information Security, Encipher & Decode is used to A. Caesar Cipher
maintain data purity & Private. Cryptography is all about B. Playfair Algorithm
encryption & decryption. And cryptography comes under C. ROT13 Algorithm
cryptology. In Cryptography, algorithms are there, through
which security takes place. Algorithms are of 2 types: 1) Now, let’s discuss about these algorithms & their weakness
Symmetric Algorithm & 2) Asymmetric algorithm. In which I noticed:
symmetric algorithm, public key encryption concept is used &
in Asymmetric algorithm, public key - private key algorithm Caesar Cipher
concept is used. According to security researchers, symmetric Caesar cipher algorithm is an algorithm which performs
key algorithm process fast as compare to public key shifting of alphabets with some certain number of positions
(asymmetric key) algorithm because, symmetric algorithm from down or up alphabets. It’s a kind of substitution cipher.
can’t use lengthy mathematical logics & concepts. So, here I Example:
came with a new technique of key algorithm to encrypt a
plain key to make secure communication. It's just converting Suppose, if shifting position number is 3, then A would be
a key to encrypted form. It’s a technique which converts 16 replaced by D. And the position is permanent for the entire
characters to 192 characters. Yes, it is like encoding 128 bits key string.
to 1536 bits of encryption. And I am using here 8 x 8 of matrix.
Means 64 characters is there; 26 Lowercase (small) Text: ABC
alphabets, 26 Uppercase (CAPITAL) alphabets, 0-9 (10 Shift: 3
numerical digits), 2 special characters. And I’m converting by Cipher: DEF
doing 12 rounds of matrix & their combinations.
This is a symmetric key algorithm, where the key will be in
encrypted form, and only the receiver who has this
application or the one who knows the algorithm flow can
decrypt it. This algorithm is a kind of Playfair algorithm,
Caesars Cipher and ROT13 algorithm but not same like that. I
referred similar kind of concepts of Playfair Algorithm,
Caesars Cipher and ROT13 algorithm.
2. PROPOSED SYSTEM Fig 1: Caesar Cipher
Proposed systems from where I got to know that they can be Source: https://www.geeksforgeeks.org/caesar-cipher-in-
an unsafe and some weakness which I’ve noticed. That cryptography
proposed algorithms are as follows:
@ IJTSRD | Unique Paper ID – IJTSRD37924 | Volume – 5 | Issue – 1 | November-December 2020 Page 388
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
As we can see, 26 alphabets are there. So, there are 26
possibilities is there to crack the cipher key. This algorithm is
very easy to crack . Now what is cipher key? ”The string result
which we get after encoding is called Cipher Key.”
F J R R G L
Fig 7: Example of ROT13
@ IJTSRD | Unique Paper ID – IJTSRD37924 | Volume – 5 | Issue – 1 | November-December 2020 Page 389
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
3. FLOWCHART
@ IJTSRD | Unique Paper ID – IJTSRD37924 | Volume – 5 | Issue – 1 | November-December 2020 Page 390
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
At the end we'll get 16 digit key. And it will be stored in 2D- 13. Now, in selected block, increase ASCII values with 1
Array.
A B C D E F G H
5. Swap 1st row with 4th Row & I J K L M N O P
5th Row with 8th Row Q R S T U V W X
repeat step 4 Y Z a b c d e f
G h i j k l m n
6. Swap 1st column with 4th column & O p q r s t u v
5th column with 8th column W x y z 0 1 2 3
repeat step 4 4 5 6 7 8 9 @ #
7. Swap 1st row values with last row values, Table 5: Iincreasing Array after ASCII values
2nd row with (last – 1) row, And Repeat step 4
3rd row with (last – 2) row,
4th row with (last – 3) row, 14. Now, in selected block, increase ASCII values with 2
and repeat step 4
A B C D E F G H
8. Swap 1st column with last column,
I J K L M N O P
2nd column with (last – 1) column,
Q R S T U V W X
3rd column with (last - 2) column,
Y Z a b c d e f
4th column with (last – 3) column,
and repeat step 4 g h i j k l m n
o p q r s t u v
9. Swap 1st row values with 5th row values, w x y z 0 1 2 3
2nd row with 6th row, 4 5 6 7 8 9 @ #
3rd row with 7th row, Table 6: Increasing Array after ASCII values
4th row with 8th row, And Repeat step 4
and repeat step 4
15. Again repeat step 14, increase ASCII value with +2
1st
10. Swap column with 5th column,
2nd column with 6th column, 16. After this all, we‟ll get 2D-array, full of 12 keys from 12
3rd column with 7th column, rounds, as follows:
4th column with 8th column, A. ADEHY12569aduxy#
and repeat step 4 B. Y125ADEHuxy#69ad
C. 1Y52DAHExu#y96da
11. Now, in selected block, increase ASCII values with 1 D. 96daxu#yDAHE1Y52
E. ad69y#uxEHAD25Y1
A B C D E F G H F. EHAD25Y1ad69y#ux
I J K L M N O P G. ADEHY12569aduxy#
Q R S T U V W X H. BEEHZ22569aduxy#
Y Z a b c d e f I. BEGJZ24769aduxy#
J. BEGJZ2477:advyy#
g h i j k l m n
K. BEGJZ2477:cfvy{%
o p q r s t u v
L. BEGJZ2477:cfvy}‟
w x y z 0 1 2 3
4 5 6 7 8 9 @ #
Now, we’ve to joint this all keys. So, we can ge encoded keys.
Table 3: Select block from array But, before uniting of all keys, we have to make it complex.
And repeat step 4 Because last key is needed to start decoding & 1st one to get
plain key.
12. Now, in selected block, increase ASCII values with 2
Now, replace 1st position with 6th position & 7th position with
A B C D E F G H 12th position. Will be getting following results.
I J K L M N O P 1. EHAD25Y1ad69y#ux
Q R S T U V W X 2. Y125ADEHuxy#69ad
Y Z a b c d e f 3. 1Y52DAHExu#y96da
g h i j k l m n 4. 96daxu#yDAHE1Y52
o p q r s t u v 5. ad69y#uxEHAD25Y1
w x y z 0 1 2 3 6. ADEHY12569aduxy#
4 5 6 7 8 9 @ # 7. BEGJZ2477:cfvy}‟
w x y z 0 1 2 3 8. BEEHZ22569aduxy#
4 5 6 7 8 9 @ # 9. BEGJZ24769aduxy#
Table 4: Select block from array 10. BEGJZ2477:advyy#
And repeat step 4 11. BEGJZ2477:cfvy{%
12. ADEHY12569aduxy#
@ IJTSRD | Unique Paper ID – IJTSRD37924 | Volume – 5 | Issue – 1 | November-December 2020 Page 391
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
Now, unite all keys, 192-byte encrypted key will be 3. Remove table ASCII values with –
generated, which look like: 2 Key: BEGJZ2477:cfvy{%
From 192-byte key, last 16-digit key is needed to start 12. Swap 1st column with 2nd column, 3rd column with 4th
decryption. column Key: Y125ADEHuxy#69ad
But before it, we‟ve to put values at their own position. Swap 13. Swap 1st row with 2nd row, 3rd row with 4th row Key:
1st values with 6th value & 7th value with 12th value. It will look ADEHY12569aduxy#
like,
1. ADEHY12569aduxy# Now finally, we got our key 16-digit key which is
2. Y125ADEHuxy#69ad ADEHY12569aduxy#
3. 1Y52DAHExu#y96da
4. 96daxu#yDAHE1Y52 7. CONCLUSIONS
5. ad69y#uxEHAD25Y1 CipherKey creates algorithm in the strongest & unbreakable.
6. EHAD25Y1ad69y#ux Plain key will be automatic generated every time. So, for
7. ADEHY12569aduxy# decoder it’s difficult to crack. By using this algorithm, integrity
8. BEEHZ22569aduxy# & confidentiality should be maintained. If bits are too
9. BEGJZ24769aduxy# extended then it will be difficult to decode.
10. BEGJZ2477:advyy#
11. BEGJZ2477:cfvy{% 8. REFERENCES
12. BEGJZ2477:ehvy}‟ [1] Network Security & Cryptography by Atul Kahate
[2] Websites:
Now, pick 12th position value, and proceed to decryption.
A. www.geeksforgeeks.com
1. Convert key string into 1D-array.
B. www.javatpoint.com
2. Make a loop of 4*4
C. www.tutorialspoint.com
D. https://people.eecs.berkeley.edu/~bh/pdf/v1ch
B E G J
12.pdf
Z 2 4 7
E. https://en.wikipedia.org/wiki/Category:Cryptog
7 : e H raphic_algorithm
V y } ‟
Table 7: Array of key
@ IJTSRD | Unique Paper ID – IJTSRD37924 | Volume – 5 | Issue – 1 | November-December 2020 Page 392