Netinfo Security ›› 2018, Vol. 18 ›› Issue (7): 69-78.doi: 10.3969/j.issn.1671-1122.2018.07.009

• Orginal Article • Previous Articles     Next Articles

A Data Symmetric Encryption Algorithm Based on Double Plaintext

Yongqian XIANG1(), Zhiqi SONG2, Tianyu WANG3   

  1. 1. Information Centre, 62101 Military, Wuhan Hubei 430010, China
    2. School of Cyber Science and Engineering, Wuhan University, Wuhan Hubei 430072, China
    3.College of Information Science and Engineering, Ocean University of China, Qingdao Shandong 266100, China
  • Received:2018-03-15 Online:2018-07-15 Published:2020-05-11

Abstract:

The security of traditional symmetric cryptosystem lies entirely in the secrecy of encryption keys. DES, 3DES, IDEA and AES, which are symmetric algorithms commonly adopted, all make their ways from one single set of plaintexts to one single set of ciphertexts. Owing to the simplex mode of information utilization, the amount of information transmitted is far from perfection. Also, they are unable to provide separate information when faced with the situation where the demand of branch conditions is not well met. In the view of the foregoing perspectives, this paper introduces double plaintext and gives a brief introduction of its encryption method and operational principle. And the encryption algorithm is divided into several sub-algorithms with each of them described carefully in terms of function and safety considerations. The paper also summarizes similarities and differences between familiar symmetric encryption algorithms and the one this paper presents. Meanwhile a few application scenarios are demonstrated to help form an understanding of the prospect of the algorithm. In the last part, this paper analyzes the strength and weakness this algorithm can bring and gives a future study direction. This encryption algorithm helps to multiply the amount of information being transmitted, and to bring in a method of writing back plaintext alternatively with high efficiency. And it innovates in preventing intruders from brute-force attack. Additionally, hash arithmetic is also introduced to ensure data integrity, resist tamper and complete inspection. So this method is well advanced technically.

Key words: symmetric cryptography, block cryptography, double plaintext, brute-force attack, tamper resistance

CLC Number: