Symmetric Encryption Algorithm Inspired by Randomness and Non-Linearity of Immune Systems

Symmetric Encryption Algorithm Inspired by Randomness and Non-Linearity of Immune Systems

Suriyani Ariffin, Ramlan Mahmod, Azmi Jaafar, Muhammad Rezal Kamel Ariffin
Copyright: © 2012 |Pages: 17
DOI: 10.4018/jncr.2012010105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In data encryption, the security of the algorithm is measured based on Shannon’s confusion and diffusion properties. This paper identifies the correspondences and highlights the essential computation elements on the basis of randomness and non-linearity of immune systems. These systems can be applied in symmetric encryption algorithm that satisfies the properties in designing a new symmetric encryption block cipher. The proposed symmetric encryption block cipher called the 3D-AES uses components of the Advanced Encryption Standard (AES) symmetric encryption block cipher and the new core components based on immune systems approaches. To ensure adequate high security of the systems in the world of information technology, the laboratory experiment results are presented and analyzed. They show that the randomness and non-linearity of the output in the 3D-AES symmetric encryption block cipher are comparable to the AES symmetric encryption block cipher.
Article Preview
Top

Encryption Algorithm

Traditionally, cryptography is a study of the means of converting information from its normal, comprehensible form into an incomprehensible format, rendering it unreadable without secret code. Historically, cryptography helped ensure secrecy in important communications, such as those of spies, military leaders and diplomats. In simple terms, cryptography is the science concerned with the study of secret communication. With the invention of computers and the internet, the need for this encryption algorithm is now universal in the world of information security. The field of cryptography (Schneier, 1995) can be divided into two techniques of study, which are asymmetric key algorithm and symmetric key algorithm. A symmetric key algorithm, or sometimes called public key algorithm, is usually based on complex mathematical problems. Symmetric key algorithm can be broadly grouped into block ciphers and stream ciphers. Other symmetric key algorithms are cryptographic hash functions and message authentication codes (MACs).

Complete Article List

Search this Journal:
Reset
Volume 12: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 11: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 10: 4 Issues (2021)
Volume 9: 4 Issues (2020)
Volume 8: 4 Issues (2019)
Volume 7: 4 Issues (2018)
Volume 6: 2 Issues (2017)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing