Visible to the public Implementation of SERPENT cryptographic algorithm for secured data transmission

TitleImplementation of SERPENT cryptographic algorithm for secured data transmission
Publication TypeConference Paper
Year of Publication2017
AuthorsKabilan, K., Saketh, M., Nagarajan, K. K.
Conference Name2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)
ISBN Number978-1-5090-3294-5
KeywordsAlgorithm design and analysis, Blockcipher, Ciphers, composability, cryptography, data integrity, Data security, deciphering process, decryption, enciphering process, Encryption, graphical programming tool, Human Behavior, human factor, IP networks, Key Management, key scheduling, linear mixing stage, Metrics, pubcrawl, Repudiation, resilience, Resiliency, round function, s-box stage, secured data transmission, SERPENT, SERPENT cryptographic algorithm, substitution permutation network, symmetric key, Technological innovation
Abstract

In the field of communication, the need for cryptography is growing faster, so it is very difficult to achieve the objectives of cryptography such as confidentiality, data integrity, non-repudiation. To ensure data security, key scheduling and key management are the factors which the algorithm depends. In this paper, the enciphering and deciphering process of the SERPENT algorithm is done using the graphical programming tool. It is an algorithm which uses substitution permutation network procedure which contains round function including key scheduling, s-box and linear mixing stages. It is fast and easy to actualize and it requires little memory.

URLhttps://ieeexplore.ieee.org/document/8275863/
DOI10.1109/ICIIECS.2017.8275863
Citation Keykabilan_implementation_2017