Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014 (2014), Article ID 795292, 12 pages
http://dx.doi.org/10.1155/2014/795292
Research Article

Two-Key Dependent Permutation for Use in Symmetric Cryptographic System

1Department of Computer Science Engineering, SASTRA University, Srinivasa Ramanujan Centre, Kumbakonam 612 001, India
2School of Computing, SASTRA University, Thanjavur 613 401, India
3School of Humanities and Sciences, SASTRA University, Thanjavur 613 401, India

Received 23 June 2014; Revised 30 August 2014; Accepted 30 August 2014; Published 2 October 2014

Academic Editor: Cheng Shao

Copyright © 2014 Arulmani Kuppusamy et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

This paper deals with a two-key based novel approach for generating a permutation table that can be used in a symmetric cryptographic system to cause diffusion. It also discusses how the permutation table generated using the approach can be applied to character based encryption and binary data block produced at intermediate stages by symmetric cipher algorithms. It also describes the effect of our approach on characters of intermediate text as well as on bits of binary data block along with the impact of a single bit change in key information on producing permutation sequences applied to plaintexts to produce ciphertexts. The results are satisfactory and the proposed approach can be employed in any symmetric block cipher algorithm that uses the predefined permutation tables.