An Ordered Cipher Technology (OCT) for the Secured Network Transmission

2021 
Cipher refer to certain explicit set of instructions and are used to secure a network. These security are done through various Secure Sockets Layers, Transport Layer Security, and so on. It also provisions about communicating secure data during the use of various protocols (like, HTTPS, FTPS, SMTP, etc). In the ordered cipher technique (OCT), we have applied the permutation technique to the bit streams in such a way that the input binary string breakdowns into acceptable-sized small sub-blocks (8 – 8192 bits), build a secret key algorithm to perform bit shuffle recursively for a finite number of times on each chunk, generate encrypted binary stream. The bit shuffle is symmetric in nature, i.e. bit shuffle is performed on each input chunk for n number of times the original stream is regenerated. Therefore, the session keys are generated through the combination of these sub blocks of bits. To get the encrypted chunk, perform the bit shuffle operation to each input chunk for (n-m) times. Likewise, the decoding is performed using the same process i.e. after performing the bit shuffle operation to each encrypted chunk for ‘m’ times. The proposed model is compared with the conventional and industrially accepted techniques.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    12
    References
    0
    Citations
    NaN
    KQI
    []