Enhanced Authenticated Encryption Scheme

Eng, Jamal Abelfatah, Morad Azzam
unpublished
− Cryptography is a vital part in information handling. In this paper we introduce a new scheme for encryption and authentication of the encrypted message. A random number is generated in each encryption process. Both of the random number and the secret key is used to generate the subkeys, a different subkey for each data block. To increase the secrecy, double permutation processes are executed on data blocks in the form of mutation and crossover. Mutation process to be performed at an
more » ... rmed at an arbitrary bit number, and crossover is performed at another bit number. Encryption of each data block is dependent on the previous encrypted data blocks, the secret key, and the random number. Also, one way hash function is generated to ensure authenticity of the message. The scheme proves its strength against cryptanalysis.
fatcat:lld7c2ictfaglbtfaoaxk7jp3m