Introducing a Platform for Encryption Algorithms

In this paper, we introduce a novel platform encryption method, which modify its keys and random number generators step by step during encryption algorithms. According to complexity of the proposed algorithm, it was safer than any other method.




References:
[1] U. D. Block, "Data Communication and Distributed Networks", Reston
Block, 1992.
[2] J .E. Ettinger, "Information Security", Chapman & Hall, 1993.
[3] Charles P. Pfleeger, "Security in Computing", Prentice Hall, 1989
William L. Schweber. "Data Communication", MC Grew-Hill 1988.
[4] D. Elizabeth, R. Denning, "Cryptography and Data Security ", Addition
- Wesley 1983W.-K. Chen, Linear Networks and Systems (Book style).
Belmont, CA: Wadsworth, 1993, pp. 123-135.
[5] Yongdae Kim, ''PRNG, Block and Stream'' September 4, 2001.
[6] Prof. Benny Chor, "Introduction to Modern Cryptography", School of
Computer Science, 1987.
[7] Mitchell Chris J., "Some Observation on the Bit _ Search Generator",
Technical Report RHUL - MA- 2004-3, 20 October 2004.
[8] K. C. Zeng, C. H. Yang, D. Y. Wei , and T. R. N. Rao, " Pseudo
Random Bit Generators in Stream - Cipher Cryptography " , IEEE
Computer , February 1991 , PP. 8-17.
[9] Chris J. Mitchell, Alexander W. Dent, "International Standards for
Stream Cipher", Information Security Group, Royal Holloway,
University of London, 1998.
[10] A. Menezes, P. Van Oorschot, S. Vanstone, "Block Cipher", CRC Press,
1996, www.cacr.math.uwaterloo.ca/hac.
[11] Kim Yongdae, PRNG, "Block and Stream Cipher", September 4, 2002.
[12] Nguyen Cao Dat, ''Network Security'', [email protected].
[13] C. Chan, J. M. Eng, "Global Corporate Communications with Integrated
Services Digital Networks", International Journal of Satellite
Communications, Vol .9 No.5, Sep- Oct 1991, pp.267- 277.
[14] Chung-Ping Wu and C. C. Jay Kuo, "Design of integrated multimedia
Compression and encryption systems," IEEE Transactions on
Multimedia, vol. 7, no. 5, 2005, pp. 828-839.
[15] S. H. Jensen, P. C. Hansen, S. D. Hansen, and J. Aa. Srّensen,
"Reduction of broad-band noise in speech by truncated qsvd," IEEE
Transactions on Speech and Audio Processing, vol. 46, no. 6, 1995, pp.
1737-1741.
[16] P. C. Hansen and S. H. Jensen, "FIR filter representations of reduce-rank
noise reduction," IEEE Transactions on Signal Processing, vol. 46,
1998, pp. 1737-1741.
[17] Zou Jian-cheng, Tie Xiao-yun. Arnold transformation of digital image
with two- dimensions and its periodicity [J]. Journal of North China
University of Technology, 2000, pp. 12-15.
[18] Yang Ya-li, CAI Na, NI Guo-qiang. Digital image scrambling
technology based on the symmetry of Arnold transform. Journal of
Beijing Institute of Technology, 2006, Vol.15, No.2: pp. 216-220.
[19] Chen Ming, PING Xi-jian. Image steganography based on Arnold
transform. Computer application research, 1, 2006, pp. 235-238.
[20] F. Autrusseau, JP. Guedon, and Y. Bizais, "Watermarking and
cryptographic schemes for medical imaging," in SPIE Medical Imaging,
2003, pp. 532-105.
[21] F. Autrusseau, B. Parrein, and M. Servieres, "Lossless compression
based on a discrete and exact radon transform: A preliminary study," in
ICASSP, 2006, pp. 466 - 468.
[22] G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, and V. Piuri, "Error
Analysis and Detection Procedures for a Hardware Implementation of
the Advanced Encryption Standard," IEEE Trans. on Computers, vol.
52, no. 4, April 2003, pp. 492-505.
[23] G. Bertoni, L. Breveglieri, I. Koren, and P. Maistri, "An Efficient
Hardware-based Fault Diagnosis Scheme for AES: Performances and
Cost," In Proc. of DFT2004, Oct. 2004, pp. 130-138.
[24] L. Breveglieri, I. Koren, and P. Maistri, "Incorporating Error Detection
and Online Reconfiguration into a Regular Architecture for the
Advanced Encryption Standard," In Proc. of the DFT2005, Oct. 2005,
pp. 72-80.
[25] K. Wu, R. Karri, G. Kuznetsov, and M. Goessel, "Low Cost Concurrent
Error Detection for the Advanced Encryption Standard," In Proc. of the
2004 International Test Conference, Oct. 2004, pp. 1242-1248.