Implementation of SERPENT cryptographic algorithm for secured data transmission
Title | Implementation of SERPENT cryptographic algorithm for secured data transmission |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Kabilan, K., Saketh, M., Nagarajan, K. K. |
Conference Name | 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) |
ISBN Number | 978-1-5090-3294-5 |
Keywords | Algorithm design and analysis, Blockcipher, Ciphers, composability, cryptography, data integrity, Data security, deciphering process, decryption, enciphering process, Encryption, graphical programming tool, Human Behavior, human factor, IP networks, Key Management, key scheduling, linear mixing stage, Metrics, pubcrawl, Repudiation, resilience, Resiliency, round function, s-box stage, secured data transmission, SERPENT, SERPENT cryptographic algorithm, substitution permutation network, symmetric key, Technological innovation |
Abstract | In the field of communication, the need for cryptography is growing faster, so it is very difficult to achieve the objectives of cryptography such as confidentiality, data integrity, non-repudiation. To ensure data security, key scheduling and key management are the factors which the algorithm depends. In this paper, the enciphering and deciphering process of the SERPENT algorithm is done using the graphical programming tool. It is an algorithm which uses substitution permutation network procedure which contains round function including key scheduling, s-box and linear mixing stages. It is fast and easy to actualize and it requires little memory. |
URL | https://ieeexplore.ieee.org/document/8275863/ |
DOI | 10.1109/ICIIECS.2017.8275863 |
Citation Key | kabilan_implementation_2017 |
- key management
- Technological innovation
- symmetric key
- substitution permutation network
- SERPENT cryptographic algorithm
- SERPENT
- secured data transmission
- s-box stage
- round function
- Resiliency
- resilience
- Repudiation
- pubcrawl
- Metrics
- linear mixing stage
- key scheduling
- Algorithm design and analysis
- IP networks
- human factor
- Human behavior
- graphical programming tool
- encryption
- enciphering process
- decryption
- deciphering process
- Data Security
- data integrity
- Cryptography
- composability
- Ciphers
- Blockcipher