1. Invo-Substitute: Three Layer Encryption For Enhanced E-Commerce Website Security Using Substitution Cipher And Involution Function.
- Author
-
Kumar, Biresh, Roy, Sharmistha, Sinha, Anurag, Kumar, Vikas, and verma, Ashish kumar
- Subjects
- *
BLOCK ciphers , *WEBSITE security , *CIPHERS , *CRYPTOGRAPHY , *ELECTRONIC commerce , *INFORMATION sharing - Abstract
The use of cryptography, or the art of secret writing, to secure information exchanged via an open medium is an ancient technique, but its significance in the modern world has greatly expanded. It has become necessary to search for ever-better cryptographic primitives that offer a level of security while limiting the time needed to encrypt and decode the data as eavesdroppers' computational power has increased. Each letter in the message is swapped out for a different letter using a substitution cipher that follows a predetermined mapping. A, B, and C are shown as an image of two alphabets with a mapping between them: D, E, and F. the Caesar cipher is an easy illustration of a substitution cipher. When more than one independent layer of encryption is used, it is known as double encryption and it serves as a safeguard against the compromising of any one layer. The dangers associated with encrypting data are reduced by using two levels of encryption. Concurrent Error Detection (CED) for cryptographic chips also offers a huge potential for detecting (intentional) fault injection attacks when errors are injected into a cryptographic chip to break the key. For a family of symmetric block ciphers whose round functions are involutions, we present in this study a temporal redundancy based CED approach that is low cost, low latency, and effective. Nearly little more time is required for this CED approach to identify both ongoing and passing errors. F(F(x))=x indicates that a function F is an involution. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF