Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
05-05-2011, 12:05 PM
Post: #1
X-MODDES (eXtended Multi Operator Delimiter based Data Encryption Standard)

.pdf  X-MODDES.pdf (Size: 427.73 KB / Downloads: 87)
Abstract
An Algorithm is considered computationally secureif it can not be broken with standard resources, either currentor future. In this paper we have introduced a new block cipheralgorithm named X-MODDES. It is unique independentapproach which uses several computational steps along withstring of operators and randomized delimiter selections byusing some suitable mathematical logic. X-MODDES isspecially designed to produce different cipher texts by applyingsame key on same plain text. Thus a new protocol has beendesigned to encrypt a given text, which allows a higher levelsecurity as compare to MODDES. The Algorithm issuccessfully implemented on text file, corresponding digitalimage file and audio file. Here we have also tried to highlightthe performance of some well known data algorithms like DES,Triple-DES, AES (Rijndael), MODDES, and compare themwith the X-MODDES. Finally it has been proved that XMODDESis one of the best performing partial symmetric keyalgorithm among the above mention algorithms particularlyfor the text message with limited size.
Keywords - MODDES, Cryptanalysis, Modified Secure CodeSequence, Transposition, Substitution
I. INTRODUCTION
Different algorithms offer different degrees of security; itdepends on how hard they are to break. If the cost required tobreak an algorithm is greater than the value of the encrypteddata then we probably consider safe. Here, we have used theword “probably” because there is always a chance of newbreakthroughs in cryptanalysis. In this paper we haveproposed several modifications of MODDES [1][2] which isa partial symmetric key algorithm, and introduced a newmodified algorithm namely X-MODDES. Here we are using32-bit key along with some specific changes on MODDES.These modifications on MODDES include addition ofseveral secure computational steps like transposition,substitution and binary operations etc. In transposition, weexchange the position of text which is shown in fig 1. Thereafter, the substitution methodology has been introducedalong with binary logic and some particular changes ofMODDES algorithm. X-MODDES algorithm also protectsthe cipher text from the attacks like Brute-force attack[6]because X-MODDESS is not fully dependent on the key andcode can not be deciphered by applying all possiblecombinations of keys.Figure 1. Transposition Process
II. ENCRYPTION PROCEDURE OF X-MODDES
In this algorithm, we have taken two predefined stacksalong with a logic based lookup table concept. The first stackconsists of different combinations of strings of operators andanother stack consists of combinations of several delimiters,which are chosen randomly on the basis of a predefinedmethod which makes the code sequence more secure. Thesteps of the algorithm are given below.
Rating X-MODDES (eXtended Multi Operator Delimiter based Data Encryption Standard) Options
Share X-MODDES (eXtended Multi Operator Delimiter based Data Encryption Standard) To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : x moddes code size, multi operator delimiter based data encryption standard, randomized operators and delimiters, comparison of x moddes with aes, x moddes pdf, xmoddes, x moddes for pdf, moddes multi operator delimiter based des, x moddes extended multi operator delimiter based data encryption standard, x moddes algo, report on x moddes algorithm, extend multi operator delimiter report, extend multi opertor delimiter project report, extended multi operator delimiter report, moddes encryption, x moddes algorithm, pdf of x moddes algorithm in cryptography, extended multi operator delimiter based data encryption standard, randomized delimiter, x moddes, moddes,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  Seminar Report On Confidential Data Storage and Deletion study tips 1 644 12-03-2015 10:56 AM
Last Post: Guest
  Bluetooth Based Smart Sensor Networks (Download Full Seminar Report) Computer Science Clay 97 74,701 02-03-2015 02:59 PM
Last Post: Guest
  Data Mining In The Applied World ( Download Full Seminar Report ) computer science crazy 12 12,153 26-02-2015 03:28 PM
Last Post: Guest
  MICROCONTROLLER BASED POWER THEFT IDENTIFICATION (Download Full Seminar Report) Computer Science Clay 248 125,154 18-02-2015 11:42 AM
Last Post: Guest
  A Graphical Password Based System for Small Mobile Devices seminar flower 1 1,122 31-01-2015 02:19 PM
Last Post: Guest
  Data Mining sumit10003@gmail.com 1 377 08-01-2015 02:32 PM
Last Post: mkaasees
  Secure Data Objects Replication in Data Grid seminar report project maker 1 492 29-11-2014 01:46 PM
Last Post: vilaspichad
  IP Traceback based on Packet Marking and Logging mkaasees 0 265 29-10-2014 04:23 PM
Last Post: mkaasees
  IP Traceback based on Packet Marking and Logging mkaasees 0 284 10-10-2014 04:50 PM
Last Post: mkaasees
  Retina Based Mouse Control seminar report project maker 0 890 10-10-2014 12:14 PM
Last Post: project maker
This Page May Contain What is X-MODDES (eXtended Multi Operator Delimiter based Data Encryption Standard) And Latest Information/News About X-MODDES (eXtended Multi Operator Delimiter based Data Encryption Standard),If Not ...Use Search to get more info about X-MODDES (eXtended Multi Operator Delimiter based Data Encryption Standard) Or Ask Here

Options: