Merging Vernam Cipher stream and Rail Fence Algorithms and How Effective They are on IoT Devices

Authors

  • Adnan Adel Bitar  Computer Science, CMS College of Science and Commerce, Coimbatore, Tamil Nadu, India
  • Dr. V. Sujatha  Computer Science, CMS College of Science and Commerce, Coimbatore, Tamil Nadu, India

DOI:

https://doi.org//10.32628/CSEIT2173149

Keywords:

Security, Vernam, Rail-Fence, encryption, performance, IoT.

Abstract

Encryption is the effective way to provide the needs of security and privacy. The performance of any encryption algorithm is one of the most important parameters if not the most one in encrypting data. Also, random access memory utilization plays an excellent role in ciphering plain texts. Speaking of standard simple encryption algorithms that most of them are weak and may not be safe to use them to cipher our data communication from any threat such as Caesar algorithm [2].However, they have good results in the parameters. Nevertheless, merging these simple algorithms could generate a more powerful algorithm that takes a very long time and excessive efforts to break it. Both standard algorithms “Vernam Cipher” and “Rail-Fence stream” merged to produce the “Railve” algorithm, which has great performance and consumes a small amount of RAM. The three algorithms are applied on two devices “a mobile phone and a laptop”

References

  1. Panda, M. "Performance analysis of encryption algorithms for security," 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, 2016, pp. 278-284, doi: 10.1109/SCOPES.2016.7955835.
  2. Gowda S, N. "Innovative enhancement of the Caesar cipher algorithm for cryptography," 2016 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Fall), Bareilly, 2016, pp. 1-4, doi: 10.1109/ICACCAF.2016.7749010.
  3. PETERS, K. “What Is Encryption?” https://www.investopedia.com/terms/e/encryption.asp. 2020
  4. Jawad, Ahmad, D., S, Sandeep. (2012). "Implementation of One Time Pad Cipher with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data security," International Journal of Science and Research, vol. 3, no. 11, pp. 2415-2421.
  5. Sengupta, N. (2018) “Security and Privacy at Cloud System”. In: B. Mishra., H. Das., S. Dehuri ., Jagadev. (eds) Cloud Computing for Optimization: Foundations, Applications, and Challenges. Studies in Big Data, vol 39. Springer, Cham. https://doi.org/10.1007/978-3-319-73676-1_9
  6. Siahaan, A, P, U. (2017, September 21). “Rail-Fence Cryptography in Securing Information”. https://doi.org/10.31227/osf.io/h5jnz
  7. https://web.archive.org/web/20121010011445/https://www.nsa.gov/about/_files/cryptologic_heritage/publications/misc/tsec_kw26.pdf
  8. https://web.archive.org/web/20110518125721/http://www.simonsingh.net/The_Black_‎Chamber/railfence.html
  9. Rajesh, S., Paul, V., Menon, VG., Khosravi, MR. (2019) “A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices”. Symmetry 11, Volume 293 - Number 2.
  10. Banerjee, A., Hasan, M., Kafle, H. (2019) “Secure Cryptosystem Using Randomized Rail Fence Cipher for Mobile Devices.” In: Arai K., Bhatia R., Kapoor S. (eds) Intelligent Computing. CompCom 2019. Advances in Intelligent Systems and Computing, vol 998. Springer, Cham. http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-030-22868-2_52.
  11. Singh, A., Nandal, A., Malik, S. (2012). “Implementation of caesar cipher with rail fence for enhancing data security.” Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2(12).
  12. Udhayakumar, U., Murugaboopathi, G. (2020). To improve user key security and cloud user region-based resource scheduler using rail fence region-based load balancing algorithm. J Ambient Intell Human Computer. https://doi.org/10.1007/s12652-020-02152-2
  13. https://en.wikipedia.org/wiki/Gilbert_Vernam..
  14. https://en.wikipedia.org/wiki/Rail_fence_cipher

Downloads

Published

2021-06-30

Issue

Section

Research Articles

How to Cite

[1]
Adnan Adel Bitar, Dr. V. Sujatha, " Merging Vernam Cipher stream and Rail Fence Algorithms and How Effective They are on IoT Devices, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 3, pp.686-691, May-June-2021. Available at doi : https://doi.org/10.32628/CSEIT2173149