Cryptompress: A Symmetric Cryptography algorithm to deny Bruteforce Attack

نویسندگان

  • Vivek Kumar
  • Sandeep Sharma
چکیده

Cryptompress, a new 128-bit (initial) private-key cryptography algorithm is proposed. It uses a block size of at least 30 bits and increments prior key size to additional 32 bits on each unsuccessful attempt of any means, including bruteforcing, further changing a specific portion of the cyphertext using the reformed Feistel network. Encryption process results from a proposed compression sequence developed using lookup table and shift operations followed by key generation. Eventually, four matrixes named add-sub matrix, reduced matrix, sequence matrix and term matrix are obtained which ultimately forms a cyphertext.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm

For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...

متن کامل

A Denied-Events based Detection Method against SSH Brute-force Attack in Supercomputing Service Environment

The brute-force attack is one of general cyber security threats in supercomputing service environment using a secure shell (SSH) protocol. First we analyzed SSH bruteforce attacks had been detected through the log file parsing method of servers in the KISTI. We found that SSH bruteforce attacks are classified ’1:1’, ’1:N’ or ’N:1’ types of attack between source and destination IP address. And t...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

On Security of Hill Cipher using Finite Fields

Hill cipher in cryptography is a symmetric key substitution algorithm, which is vulnerable to known plaintext attack. The present paper provides two fold securities to the existing Hill cipher by using the elements of finite fields and logical operator.

متن کامل

Authentication of the Wireless Rfid System Using Security Protocol

Radio Frequency Identification (RFID) system is a contact less automatic identification system that has attracted much attention recently. It consists of RFID tags, RFID reader and back-end server. The information stored in the RFID tag is easily exposed to the outside world. So various types of attacks are possible such as bruteforce attack, eavesdropping and man-in-the-middle attack. The adve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1604.02128  شماره 

صفحات  -

تاریخ انتشار 2016