MESH Encryption : A Multifarious Synchronized Haze

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2018 by IJCTT Journal
Volume-57 Number-1
Year of Publication : 2018
Authors : Akshay R, Persis Urbana Ivy B, Shanmugapriya S, Anandha Vishnu P
  10.14445/22312803/IJCTT-V57P106

MLA

Akshay R, Persis Urbana Ivy B, Shanmugapriya S, Anandha Vishnu P "MESH Encryption : A Multifarious Synchronized Haze". International Journal of Computer Trends and Technology (IJCTT) V57(1):29-34, March 2018. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract
Information is not secure in this eon since any attacker can compromise a system and get access to it.. In this paper .In order to make communications secure a randomized model of encryption with key Meshing is proposed. Mesh encryption uses randomization for encrypting the plaintext into ciphers using private symmetric keys and set of preset tables.This is a stream cipher algorithm . This randomization makes the cryptanalysis exhausting on extant attacks such as ciphertext attacks brute force attacks, chosen ciphertext, digrams and trigrams attacks,. This algorithm uses different layers of encryption and the labyrinth of these layers are also non aligned. This is achieved by creating a puzzle that dynamically repositions itself. Thus making the ciphertext formed after each transmission vary and will result in distinct ciphers after each transmission. In addition to that the length of plaintext and ciphertext is analogous, the transposition occurs in bit level in irregular fashion, increasing the complexity for cryptanalysis.It also makes private one to one communications safer. It can be applied in militant applications, hospital, commerce where data security and privacy is of concern.

References
1-A Survey Of Intrusion Detection Systems,Teresa F.Lunt,Director,Secure Systems Research,Computer Science Laboratory,SRI International,Menlo Park, CA 94025 ,USA
[2]-Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey Amitav Mukherjee, Member, IEEE, S. Ali A. Fakoorian, Student Member, IEEE, Jing Huang, Member, IEEE, and A. Lee Swindlehurst, Fellow, IEEE
[3]-Internet of Things in Industries: A Survey Li Da Xu, Senior Member, IEEE, Wu He, and Shan cang Li,IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 10, NO. 4, NOVEMBER 2014
[4]-The Internet of Things—A survey of topics and trends ,Andrew Whitmore & Anurag Agarwal & Li Da Xu,Inf Syst Front (2015) 17:261–274 DOI 10.1007/s10796-014-9489-2
[5]-A Survey on Cryptography using Optimization algorithms in WSNs ,Swapna B. Sasi 1,2* and N. Sivanandam 3,Indian Journal of Science and Technology, Vol 8(3), 216–221, February 2015
[6]-Cryptography and Steganography – A Survey by A. Joseph , Raphael Dr , V. Sundaram Int.J. Comp.Tech.Appl.,Vol 2 (3),626-630.ISSN:2229-6093
[7]- ComparativeAnalysisofCryptographyCipherTechniquesLaukendr aSingh,RahulJohari DepartmentofComputerEngineering, USICT, GGSIPUniversityNewDelhi,India International Conference Of Advance Research and Innovation.
[8]-A comparative survey of symmetric and asymmetric key cryptography Sourabh Chandra,.Smita Paira ,Sk Safikul Alam ,Dr.(Prof.) Goutam Sanya,2014 International Conference on Electronics, Communication and Computational Engineering(ICECCE).978- 1-4799-5748-4/14/$31.00 © 2014 IEEE
[9]-Secure Password Transmission for Web Applications over Internet using Cryptography and Image Steganography:Mehdi Hussain, Ainuddin Wahid, Abdul Wahab Ishrat Batool and Muhammad Arif
[11]-Multilevel Network Security Combining Cryptography and Steganography on ARM Platform Pallavi H. Dixit, Kamalesh B. Waskar, Uttam L Bombale.Journal of Embedded Systems, 2015 3 (1), pp 11-15. DOI: 10.12691/jes-3- 1-2
[12]-N/2 BIT PARALLEL LFSR FOR CRYPTOGRAPHY,Shiv Dutta Mishra ,.International Journal of Advanced Engineering Research and Studies E-ISSN-2249-8974,Proceedings of BITCON 2015 Innovations For National Development National Conference on :Research and Development in Computer Science and Applications
[13]-A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithms, N Bisht, S Singh - International Journal of Innovative Research in Science, 2015
[14]-COMPARATIVE ANALYSIS OF PERFORMANCE EFFICIENCY AND SECURITY MEASURES OF SOME ENCRYPTION ALGORITHMS AL.Jeeva,Dr.V.Palanisamy, K.Kanagaram International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com.Vol. 2, Issue 3, May-Jun 2012, pp.3033-3037
[15]-Cryptography Policy:Lance J. Hoffman, Ali, Faraz, A,Steven L. Heckler, and Ann Huybrechts.Communications of the ACM. Communications of the ACM, Sept. 1994, p. 109+. Academic OneFile, Accessed 2 Nov. 2017.
[16]-A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing Kaitai Liang,Man Ho Au,Joseph K.Liu, Willy Susilo,Duncan S.Wong,Guomin Yang,YongYu,AnjiaYang. Future Generation Computer Systems Volume 52, November 2015, Pages 95-108

Keywords
Private Key encryption, Key Generation, Arbitrary Key(AK), Base Key(BK), Transmitted Key(TK), Meshing Key(MK), Special Character Cipher(SCC), Anagram(AG), Numeric Cipher(NCC), AlphaNumeric Cipher(ANC), Alphabet Cipher(AC), Mesh Splitter(MS), Arbitrary Slicer(AS).