[vc_empty_space][vc_empty_space]
Double Chaining Algorithm: A secure symmetric-key encryption algorithm
Kurniawan D.H.a, Munir R.a
a Department of Informatics, Institute Technology, Bandung, Indonesia
[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2016 IEEE.Technology is a key of innovation in any aspect of this modern era. In every technology, data becomes the most important asset to be protected. Many encryption algorithms are widely available and used in information security. Encryption can provide secure information across platform. Encryption algorithms are classified into two groups: symmetric-key (also called secret-key) and asymmetric-key (also called public-key). Generally, asymmetric-key encryption is used along side symmetric-key encryption to get the best performance of data transfer. Earlier many researchers have proposed various encryption algorithms such as AES, DES, Blowfish, etc. However, as security level is increasing, the time and complexity of algorithm is also increasing. This is the major cause of decreasing the speed and efficiency of the encryption system. In this paper we have proposed a new encryption algorithm ‘Double Chaining Algorithm (DCA)’ which enhances the security performance. The DCA is a symmetric-key encryption algorithm that uses 128-256 bits key size. This algorithm uses XOR operation for the chaining process so that it has small complexity and can be implemented easily in hardware mode to increase its encryption process. This paper is an attempt to invent a new encryption model which is secure and very fast. The average Avalanche Effect in this algorithm is 0.996 out of 1.00. Moreover, the experiment and analysis result gives further proof of the DCA’s strength.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Avalanche effects,Complexity of algorithm,Encryption algorithms,Encryption system,Experiment and analysis,Security performance,Symmetric key encryption,Symmetric key encryption algorithm[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Avalanche Effect,information security Double Chaining Algorithm,symmetric-key encryption[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICAICTA.2016.7803097[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]