X-MODDES (eXtended Multi Operator Delimiter based Data Encryption Standard)
#1

[attachment=13315]
Abstract
An Algorithm is considered computationally secureif it can not be broken with standard resources, either currentor future. In this paper we have introduced a new block cipheralgorithm named X-MODDES. It is unique independentapproach which uses several computational steps along withstring of operators and randomized delimiter selections byusing some suitable mathematical logic. X-MODDES isspecially designed to produce different cipher texts by applyingsame key on same plain text. Thus a new protocol has beendesigned to encrypt a given text, which allows a higher levelsecurity as compare to MODDES. The Algorithm issuccessfully implemented on text file, corresponding digitalimage file and audio file. Here we have also tried to highlightthe performance of some well known data algorithms like DES,Triple-DES, AES (Rijndael), MODDES, and compare themwith the X-MODDES. Finally it has been proved that XMODDESis one of the best performing partial symmetric keyalgorithm among the above mention algorithms particularlyfor the text message with limited size.
Keywords - MODDES, Cryptanalysis, Modified Secure CodeSequence, Transposition, Substitution
I. INTRODUCTION
Different algorithms offer different degrees of security; itdepends on how hard they are to break. If the cost required tobreak an algorithm is greater than the value of the encrypteddata then we probably consider safe. Here, we have used theword “probably” because there is always a chance of newbreakthroughs in cryptanalysis. In this paper we haveproposed several modifications of MODDES [1][2] which isa partial symmetric key algorithm, and introduced a newmodified algorithm namely X-MODDES. Here we are using32-bit key along with some specific changes on MODDES.These modifications on MODDES include addition ofseveral secure computational steps like transposition,substitution and binary operations etc. In transposition, weexchange the position of text which is shown in fig 1. Thereafter, the substitution methodology has been introducedalong with binary logic and some particular changes ofMODDES algorithm. X-MODDES algorithm also protectsthe cipher text from the attacks like Brute-force attack[6]because X-MODDESS is not fully dependent on the key andcode can not be deciphered by applying all possiblecombinations of keys.Figure 1. Transposition Process
II. ENCRYPTION PROCEDURE OF X-MODDES
In this algorithm, we have taken two predefined stacksalong with a logic based lookup table concept. The first stackconsists of different combinations of strings of operators andanother stack consists of combinations of several delimiters,which are chosen randomly on the basis of a predefinedmethod which makes the code sequence more secure. Thesteps of the algorithm are given below.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: sobel operator verilog, advanced encryption standard matlab code, seminar synopsis for triple data encryption standard, rov operator, image upload and operate in sobel operator, ball valve chain operator, moddes,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Block Chain and Data Science jntuworldforum 0 8,190 06-10-2018, 12:15 PM
Last Post: jntuworldforum
  Data Encryption Standard (DES) seminar class 2 9,380 20-02-2016, 01:59 PM
Last Post: seminar report asees
  Multi signature smart paper boy 2 2,079 11-01-2016, 02:00 PM
Last Post: seminar report asees
  Skin Tone based Secret Data hiding in Images seminar class 9 7,040 23-12-2015, 04:18 PM
Last Post: HelloGFS
Brick XML Data Compression computer science crazy 2 2,400 07-10-2014, 09:26 PM
Last Post: seminar report asees
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 15,070 30-03-2014, 04:40 AM
Last Post: Guest
  GREEN CLOUD -A Data Center Approach computer topic 0 1,543 25-03-2014, 10:13 PM
Last Post: computer topic
  Human Robot Interaction in Multi-Agent Systems pdf computer topic 0 1,222 25-03-2014, 09:43 PM
Last Post: computer topic
  XML encryption full report computer science technology 6 12,797 21-03-2014, 05:22 PM
Last Post: MichaelPn
  3D-OPTICAL DATA STORAGE TECHNOLOGY computer science crazy 3 8,527 12-09-2013, 08:28 PM
Last Post: Guest

Forum Jump: