Full Paper View Go Back

Examining Cryptographic Primitives and Introducing the Periodic-Shift Cipher

Padma Sree Uma Nandini Kadavakollu1 , Sony Kumari2 , Srinivasa Rao Gundu3

  1. Dept. of Digital Forensics, Malla Reddy University, Hyderabad, India.
  2. Dept. of Digital Forensics, Malla Reddy University, Hyderabad, India.
  3. Dept. of Computer Sciences, Malla Reddy University, Hyderabad, India.

Section:Research Paper, Product Type: Journal-Paper
Vol.12 , Issue.4 , pp.8-17, Aug-2024


Online published on Aug 31, 2024


Copyright © Padma Sree Uma Nandini Kadavakollu, Sony Kumari, Srinivasa Rao Gundu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Padma Sree Uma Nandini Kadavakollu, Sony Kumari, Srinivasa Rao Gundu, “Examining Cryptographic Primitives and Introducing the Periodic-Shift Cipher,” International Journal of Scientific Research in Computer Science and Engineering, Vol.12, Issue.4, pp.8-17, 2024.

MLA Style Citation: Padma Sree Uma Nandini Kadavakollu, Sony Kumari, Srinivasa Rao Gundu "Examining Cryptographic Primitives and Introducing the Periodic-Shift Cipher." International Journal of Scientific Research in Computer Science and Engineering 12.4 (2024): 8-17.

APA Style Citation: Padma Sree Uma Nandini Kadavakollu, Sony Kumari, Srinivasa Rao Gundu, (2024). Examining Cryptographic Primitives and Introducing the Periodic-Shift Cipher. International Journal of Scientific Research in Computer Science and Engineering, 12(4), 8-17.

BibTex Style Citation:
@article{Kadavakollu_2024,
author = {Padma Sree Uma Nandini Kadavakollu, Sony Kumari, Srinivasa Rao Gundu},
title = {Examining Cryptographic Primitives and Introducing the Periodic-Shift Cipher},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {8 2024},
volume = {12},
Issue = {4},
month = {8},
year = {2024},
issn = {2347-2693},
pages = {8-17},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3591},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3591
TI - Examining Cryptographic Primitives and Introducing the Periodic-Shift Cipher
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Padma Sree Uma Nandini Kadavakollu, Sony Kumari, Srinivasa Rao Gundu
PY - 2024
DA - 2024/08/31
PB - IJCSE, Indore, INDIA
SP - 8-17
IS - 4
VL - 12
SN - 2347-2693
ER -

85 Views    228 Downloads    20 Downloads
  
  

Abstract :
Cryptography is an essential element of modern digital security. It consists of techniques for translating plaintext into ciphertext and back to allow safe communication. It also serves as a foundation for critical applications such as secure internet interactions, electronic business, and data integrity authentication. This work investigates five types of cryptographic primitives: symmetric encryption, asymmetric cryptography, hash functions, and digital signatures, while examining their impact on the CIA Triangle—confidentiality, integrity, and availability. Both classical and modern advances in cryptography are discussed, tracing their evolution from classical ciphers to modern algorithms like RSA, along with the emerging threat of quantum computing. Additionally, a unique encryption technique, the Periodic-Shift Cipher B/I law, is introduced. Designed for educational purposes, it emphasizes simplicity and security, using only odd-numbered shifts and the new “a=z” rule. This article reviews some of the positives and negatives of this architecture and suggests areas for further investigation to enhance pro-cryptography education and better prepare forensic specialists for future security challenges.

Key-Words / Index Term :
Cryptography, Digital security, Secure communication, Symmetric encryption, Asymmetric cryptography, Hash functions, Digital signatures, RSA algorithm

References :
[1] R.I. Masya, R.F. Aji, and S. Yazid, "Comparison of Vigienere Cipher and Affene Cipher in Three-pass Protocol for Securing Image," International Conference in Science and Technology, Vol., pp. 1-5, 2020.
[2] A. Carlson, S.R. Mikkilineni, M.W. Totaro, R.B. Wiells, and R.E. Hiromoto, "Equivalence of Product Ciphers to Substitution Ciphers and their Security Implications," International Symposium on Networks, Computers and Communications, Vol., pp. 1-6, 2022.
[3] S. Vatsayan, R.A. Hydri, and J.K. Verma, "Design of Hybrid Cryptography System based on Vigenère Cipher and Polybius Cipher," International Conference on Computational Performance Evaluation, Vol., pp. 848-852, 2020.
[4] D. Gautam, C. Agrawal, P. Sharma, M. Mehta, and P. Saini, "An Enhanced Cipher Technique Using Vigienere and Modified Caesar Cipher," International Conference on Trends in Electronics and Informatics, Vol., pp. 1-9, 2018.
[5] N. Jain and S.S. Chauhan, "Novel Approach Transforming Stream Cipher to Block Cipher," International Conference on Technological Advancements and Innovations, Vol., pp. 182-187, 2021.
[6] K. Singh, R. Johari, K. Singh, and H. Tyagi, "Mercurial Cipher: A New Cipher Technique and Comparative Analysis with Classical Cipher Techniques," International Conference on Computing, Communication, and Intelligent Systems, Vol., pp. 223-228, 2019.
[7] A. Al-Sabaawi, "Cryptanalysis of Vigenère Cipher: Method Implementation," IEEE Asia-Pacific Conference on Computer Science and Data Engineering, Vol., pp. 1-4, 2020.
[8] R. Dodmane, R. K R, S. Shetty, K.R. N S, B. K, and S.M.N. Islam, "Implementation of NonLinear Feed Back Stream Cipher System through Hybrid block Cipher Mode to Enhance the Resistivity and Computation Speed of AES," IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering, Vol., pp. 1-6, 2022.
[9] T.M. Aung and N.N. Hla, "A Complex Polyalphabetic Cipher Technique Myanmar Polyalphabetic Cipher," International Conference on Computer Communication and Informatics, Vol., pp. 1-9, 2019.
[10] S. Souror, N. El-Fishawy, and M. Badawy, "SCKHA: A New Stream Cipher Algorithm Based on Key Hashing and Splitting Technique," International Conference on Electronic Engineering, Vol., pp. 1-7, 2021.
[11] T. Ichiki and A. Tsuneda, "Study on Security Enhancement of 64-Bit NFSR-based Block Cipher Systems with Ring Structure," International Conference on Information and Communication Technology Convergence, Vol., pp. 842-844, 2018.
[12] B. Triandi, E. Ekadiansyah, R. Puspasari, L. T. Iwan, and F. Rahmad, "Improve Security Algorithm Cryptography Vigenere Cipher Using Chaos Functions," International Conference on Cyber and IT Service Management, Vol., pp. 1-5, 2018.
[13] A. Sahi, D. Lai, and Y. Li, "An Efficient Hash Based Parallel Block Cipher Mode of Operation," International Conference on Computer and Communication Systems, Vol., pp. 33-40, 2018.
[14] D. Sehrawat, N. S. Gill, and M. Devi, "Comparative Analysis of Lightweight Block Ciphers in IoT-Enabled Smart Environment," International Conference on Signal Processing and Integrated Networks, Vol., pp. 915-920, 2019.
[15] A. Serdano, M. Zarlis, and E. B. Nababan, "Performance of Combining Hill Cipher Algorithm and Caesar Cipher Algorithm in Text Security," International Conference on Artificial Intelligence and Mechatronics Systems, Vol., pp. 1-5, 2021.
[16] A. Al-Sabaawi, "Cryptanalysis of Stream Cipher: Method Implementation," IEEE Asia-Pacific Conference on Computer Science and Data Engineering, Vol., pp. 1-4, 2021.
[17] Joydeep Dey, Sunil Karforma, “A Recent Study on Security Techniques of Information Communication Systems,” International Journal of Scientific Research in Multidisciplinary Studies, Vol.10, Issue.4, pp.77-83, 2024.
[18] Auparajita Krishnaa, Dharmendra Kumar Gurjar, “The Concept of Basic Cipher Text for Enhancing Security in the Algorithms of Cryptography Applications Using Labelled Graphs,” International Journal of Scientific Research in Mathematical and Statistical Sciences, Vol.10, Issue.3, pp.9-13, 2023.
[19] S. Dubey, R. Jhaggar, R. Verma, D. Gaur, “Encryption and Decryption of Data by Genetic Algorithm,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.47-52, 2017.
[20] M. Rodinko and R. Oliynykov, "Comparing Performances of Cypress Block Cipher and Modern Lightweight Block Ciphers on Different Platforms," IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology, Vol., pp. 113-116, 2019.
[21] C. Bharathi, K. Y. Annapurna, D. Koppad, and K. Sudeendra Kumar, "An Analysis of Stream and Block Ciphers for Scan Encryption," International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control, Vol., pp. 1-5, 2022.
[22] Srinivasa Rao Gundu, T. Anuradha, “Digital Data Growth and the Philosophy of Digital Universe in View of Emerging Technologies,” International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.2, pp.59-64, 2020.
[23] S. A. Thileeban, "Encryption of images using XOR Cipher," IEEE International Conference on Computational Intelligence and Computing Research, Vol., pp. 1-3, 2016.
[24] Dr. G. S. Rao, Dr. P. Charanarur, and Mr. P. Patel, Eds., Cloud Computing and its Service Oriented Mechanism, AkiNik Publications, 2022.
[25] B. P. R. V. Datta and S. K. N, "FPGA Implementation of Different Layers of Present Cipher," International Conference on Intelligent Technologies, Vol., pp. 1-4, 2023.
[26] P. Charanarur, H. Jain, G. S. Rao, D. Samanta, S. S. Sengar, and C. T. Hewage, “Machine-Learning-Based Spam Mail Detector,” SN Computer Science, Vol. 4, No. 6, 2023.
[27] C. Panem, S. R. Gundu, and J. Vijaylaxmi, “The Role of Machine Learning and Artificial Intelligence in Detecting the Malicious Use of Cyber Space,” Robotic Process Automation, Wiley, Vol., pp. 19–32, Aug. 25, 2023.
[28] J. Ge, Y. Xu, R. Liu, E. Si, N. Shang, and A. Wang, "Power Attack and Protected Implementation on Lightweight Block Cipher SKINNY," Asia Joint Conference on Information Security, Vol., pp. 69-74, 2018.
[29] P. Charanarur, S. R. Gundu, and J. Vijaylaxmi, “Decision Making Using Fuzzy Logic Using Multicriteria,” Fuzzy Logic Applications in Computer Science and Mathematics, Wiley, Vol., pp. 1–12, Sep. 15, 2023.
[30] S. G. Garba, A. A. Obiniyi, M. A. Ibrahim, and B. I. Ahmad, "Towards Finding An Optimal S-box For Lightweight Block Cipher," Information Technology for Education and Development, Vol., pp. 1-8, 2022.
[31] J. Cheng, S. Guo, and J. He, "ALLPC: A Lightweight Block Cipher Based on Generalized Feistel Networks for IoT," IEEE International Performance, Computing, and Communications Conference, Vol., pp. 1-8, 2021.
[32] A. Vambol, "The prospects for group-based knapsack ciphers in the post-quantum era," IEEE 9th International Conference on Dependable Systems, Services and Technologies, Vol., pp. 271-275, 2018.
[33] W. -C. Yang and J. -X. Lee, "Implementation of stream cipher service in JCA," International Symposium on Next-Generation Electronics, Vol., pp. 557-561, 2013.
[34] S. R. Gundu, C. Panem, and J. Vijaylaxmi, “A Comprehensive Study on Cloud Computing and its Security Protocols and Performance Enhancement Using Artificial Intelligence,” Robotic Process Automation, Wiley, Vol., pp. 1–17, Aug. 25, 2023.
[35] A. Singh, N. Chawla, M. Kar, and S. Mukhopadhyay, "Energy efficient and side-channel secure hardware architecture for lightweight cipher SIMON," IEEE International Symposium on Hardware Oriented Security and Trust, Vol., pp. 159-162, 2018.
[36] H. Shi, T. Pu, W. Mou, and Y. Chen, "NIST Randomness Tests on the Extended Key of Quantum Noise Random Stream Cipher," International Conference on Optical Communications and Networks, Vol., pp. 1-3, 2019.
[37] C. Oikonomou, C. S. Kouzinopoulos, D. Ioannidis, and D. Tzovaras, "An Encryption Scheme using Dynamic Keys and Stream Ciphers for Embedded Devices," Mediterranean Conference on Embedded Computing, Vol., pp. 1-4, 2022.
[38] K. -M. Ma, T. -B. -T. Cao, and D. -H. Le, "Design of an SoC Based on 32-bit RISC-V CPU and Lightweight Block Cipher PRINCE on FPGA," 9th NAFOSTED Conference on Information and Computer Science, Vol., pp. 25-29, 2022.
[39] I. Aouissaoui, T. Bakir, and A. Sakly, "FPGA Hardware Co-Simulation of a Stream Cipher Image Cryptosystem based on Fixed-Point Chaotic Map," 19th International Multi-Conference on Systems, Signals & Devices, Vol., pp. 1764-1769, 2022.
[40] A. Heuser, S. Picek, S. Guilley, and N. Mentens, "Lightweight Ciphers and Their Side-Channel Resilience," IEEE Transactions on Computers, Vol. 69, No. 10, pp. 1434-1448, 2020.
[41] S. Taha and H. Mostafa, "Accelerated Software Implementation of Authenticated Encryption Stream Ciphers for High Speed Applications," 31st International Conference on Microelectronics, Vol., pp. 27-31, 2019.
[42] J. Gao, L. Gu, and B. Sun, "Power Attack and Protected Implementation on Block Cipher BIG," 5th International Conference on Information Science, Computer Technology and Transportation, Vol., pp. 1-6, 2020.
[43] S. -W. Eum, H. -J. Kim, H. -D. Kwon, K. -B. Jang, H. -J. Kim, and H. -J. Seo, "Implementation of SM4 block cipher on CUDA GPU and its analysis," International Conference on Platform Technology and Service, Vol., pp. 71-74, 2022.
[44] S. Wang, R. Zhao, Z. Yu, and L. Wang, "Optimized implementations of stream cipher ZUC-256 algorithm," 4th International Academic Exchange Conference on Science and Technology Innovation, Vol., pp. 952-956, 2022.
[45] R. S. Mohammed, "Simon Chaotic: An enhancement of SIMON block cipher by using Arnold and Henon chaotic maps," 8th International Conference on Contemporary Information Technology and Mathematics, Vol., pp. 237-242, 2022.
[46] P. Shivapriya and K. N. Meera, "Application for Digraph Substitution Cipher using Graph Labeling Techniques," IEEE 5th PhD Colloquium on Emerging Domain Innovation and Technology for Society, Vol., pp. 1-2, 2023.
[47] G. S. Manoj, B. Sravanthi, G. Thirumal, and S. R. Venishetty, "VLSI Implementation of SMS4 Cipher for Optimized Utilization of FPGA," Second International Conference on Inventive Communication and Computational Technologies, Vol., pp. 1225-1231, 2018.
[48] A. Al-Sabaawi, "Cryptanalysis of Classic Ciphers: Methods Implementation Survey," International Conference on Intelligent Technologies, Vol., pp. 1-6, 2021.
[49] Y. Wang, "A Classical Cipher-Playfair Cipher and Its Improved Versions," International Conference on Electronic Information Engineering and Computer Science, Vol., pp. 123-126, 2021.
[50] K. Singh, R. Johari, K. Singh, and H. Tyagi, "Mercurial Cipher: A New Cipher Technique and Comparative Analysis with Classical Cipher Techniques," International Conference on Computing, Communication, and Intelligent Systems, Vol., pp. 223-228, 2019.
[51] D. Gautam, C. Agrawal, P. Sharma, M. Mehta, and P. Saini, "An Enhanced Cipher Technique Using Vigenere and Modified Caesar Cipher," 2nd International Conference on Trends in Electronics and Informatics, Vol., pp. 1-9, 2018.
[52] S. Gupta, R. Johari, P. Garg, and K. Gupta, "C3T: Cloud based Cyclic Cryptographic Technique and it’s comparative analysis with classical cipher techniques," 5th International Conference on Signal Processing and Integrated Networks, Vol., pp. 332-337, 2018.
[53] T. M. Aung and N. N. Hla, "A Complex Polyalphabetic Cipher Technique Myanmar Polyalphabetic Cipher," International Conference on Computer Communication and Informatics, Vol., pp. 1-9, 2019.
[54] T. Ichiki and A. Tsuneda, "Study on Security Enhancement of 64-Bit NFSR-based Block Cipher Systems with Ring Structure," International Conference on Information and Communication Technology Convergence, Vol., pp. 842-844, 2018.
[55] A. Serdano, M. Zarlis, and E. B. Nababan, "Performance of Combining Hill Cipher Algorithm and Caesar Cipher Algorithm in Text Security," International Conference on Artificial Intelligence and Mechatronics Systems, Vol., pp. 1-5, 2021.
[56] C. Bharathi, K. Y. Annapurna, D. Koppad, and K. Sudeendra Kumar, "An Analysis of Stream and Block Ciphers for Scan Encryption," International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control, Vol., pp. 1-5, 2022.
[57] J. R. Paragas, A. M. Sison, and R. P. Medina, "An Improved Hill Cipher Algorithm using CBC and Hexadecimal S-Box," IEEE Eurasia Conference on IOT, Communication and Engineering, Vol., pp. 77-81, 2019.
[58] N. Jain and S. S. Chauhan, "Novel Approach Transforming Stream Cipher to Block Cipher," International Conference on Technological Advancements and Innovations, Vol., pp. 182-187, 2021.
[59] R. Majumder, S. Datta, and M. Roy, "An Enhanced Cryptosystem Based on Modified Classical Ciphers," International Conference on Advanced Computing and Communication Systems, Vol., pp. 692-696, 2022.
[60] E. B. Kavun, "A Power Reduction Technique Based on Linear Transformations for Block Ciphers," IFIP/IEEE 30th International Conference on Very Large Scale Integration, Vol., pp. 1-6, 2022.
[61] M. R and N. K. V, "Optimized Implementation of S-box and Inverse S-box for PRESENT Lightweight Block Cipher," International Conference on Visions Towards Emerging Trends in Communication and Networking Technologies, Vol., pp. 1-5, 2023.
[62] A. Al-Sabaawi, "Cryptanalysis of Vigenère Cipher: Method Implementation," IEEE Asia-Pacific Conference on Computer Science and Data Engineering, Vol., pp. 1-4, 2020.
[63] E. Jintcharadze, T. Sarajishvili, A. Surmanidze, and D. Khojava, "Implementation and Comparative Analysis of Symmetric Encryption Model Based on Substitution Cipher Techniques," IEEE East-West Design & Test Symposium, Vol., pp. 1-6, 2021.
[64] O. S. Sitompul, Handrizal, N. H. Pasaribu, and E. B. Nababan, "Hybrid RC4 and Affine Ciphers to Secure Short Message Service on Android," International Conference on Informatics and Computing, Vol., pp. 1-6, 2018.
[65] R. R. K. Chaudhary and K. Chatterjee, "An Efficient Lightweight Cryptographic Technique for IoT based E-healthcare System," International Conference on Signals Processing and Integrated Networks, Vol., pp. 991-995, 2020.
[66] S. Iyer, G. V. Bansod, P. N. V, and S. Garg, "Implementation and Evaluation of Lightweight Ciphers in MQTT Environment," International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques, Vol., pp. 276-281, 2018.
[67] O. Jallouli, M. Chetto, and S. E. Assad, "Lightweight Stream Ciphers based on Chaos for Time and Energy Constrained IoT Applications," Mediterranean Conference on Embedded Computing, Vol., pp. 1-5, 2022.
[68] Ali.M., Nazish.M., Ashaq.S., I. Sultan, and M. T. Banday, "Design of Hybrid Glitch-Reduction Techniques for Loop Unrolled SIMON Block Cypher," Smart Technologies, Communication and Robotics, Vol., pp. 1-6, 2022.
[69] Kumar.P., Mishra.Z, and Acharya.B., "High frequency architecture of SLIM lightweight block cipher for resource-constrained IoT applications," International Conference on Microwave, Optical, and Communication Engineering, Vol., pp. 1-4, 2023.
[70] D. G. Brosas, A. M. Sison, and R. P. Medina, "Modified OTP Based Vernam Cipher Algorithm using Multilevel Encryption Method," IEEE Eurasia Conference on IOT, Communication and Engineering, Vol., pp. 201-204, 2019.
[71] E. Maro and V. Girichev, "Power Analysis of Symmetric Block Cipher Kuznyechik," International Conference on Computer Communication and the Internet, Vol., pp. 106-109, 2020.
[72] R. Dodmane, R. K R, S. Shetty, K. R. N S, B. K, and S. M. N. Islam, "Implementation of Non-Linear Feedback Stream Cipher System through Hybrid block Cipher Mode to Enhance the Resistivity and Computation Speed of AES," IEEE 9th Utthar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering, Vol., pp. 1-6, 2022.
[73] F. Dridi, S. El Assad, C. Atamech, W. E. Youssef, and M. Machhout, "Design and Implementation on FPGA Board of a Chaos-based Stream Cipher," International Conference for Internet Technology and Secured Transactions, Vol., pp. 1-5, 2020.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation