SD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE)

Full Text (PDF, 411KB), PP.43-49

Views: 0 Downloads: 0


Somdip Dey 1,*

1. Department of Computer Science, St. Xavier‘s College [Autonomous], Kolkata, India

* Corresponding author.


Received: 12 Feb. 2012 / Revised: 26 Mar. 2012 / Accepted: 2 May 2012 / Published: 8 Jun. 2012

Index Terms

Cryptography, Repetition exclusion, Bit Manipulation, Decryption, SD-REE, SD-AREE, Modified Caesar Cipher


This paper presents a new combined symmetric key cryptographic technique, which is generally an amalgamation of Bit Manipulation, generalized Modified Vernam Cipher, Single Bit Manipulation and Modified Caesar Cipher. The technique proposed here is basically an advanced and upgraded module of SD-AREE cryptographic method, which is based on Modified Caesar Cipher along with Bit Manipulation and the SD-AREE module is very useful in excluding any repetition pattern from a message that is to be encrypted. The proposed method, SD-AREE-I Cipher, is a complete cipher method and unlike its predecessor, SD-AREE, does not need to be added to other cryptographic methods to make those methods stronger. SD-AREE-I method is used to encrypt/decrypt different file formats and the results were very satisfactory. This method is unique and strong because the method contains feedback mechanism and generates new encrypted output every time even with slightest change in the input file (message). The proposed method can also be used for network security.

Cite This Paper

Somdip Dey, "SD-AREE-I Cipher: Amalgamation of Bit Manipulation, Modified VERNAM CIPHER & Modified Caesar Cipher (SD-AREE)", International Journal of Modern Education and Computer Science (IJMECS), vol.4, no.6, pp.43-49, 2012. DOI:10.5815/ijmecs.2012.06.06 


[1]Symmetric key cryptosystem using combined cryptographic algorithms - Generalized modified Vernam Cipher method, MSA method and NJJSAA method: TTJSA algorithm " Proceedings of Information and Communication Technologies (WICT), 2011 " held at Mumbai, 11th – 14th Dec, 2011, pp.1175-1180.
[2]Symmetric Key Cryptography using Random Key generator: Asoke Nath, Saima Ghosh, Meheboob Alam Mallik: "Proceedings of International conference on Security and Management (SAM'10" held at Las Vegas, USA Jull 12-15, 2010), P-Vol-2, pp.239-244.
[3]Somdip Dey, Joyshree Nath and Asoke Nath. Article: An Advanced Combined Symmetric Key Cryptographic Method using Bit Manipulation, Bit Reversal, Modified Caesar Cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm. International Journal of Computer Applications 46(20):46-53, May 2012. Published by Foundation of Computer Science, New York, USA.
[4]Somdip Dey, "SD-REE: A Cryptographic Method To Exclude Repetition From a Message", Proceedings of The International Conference on Informatics & Applications (ICIA 2012), Malaysia, p. 182 – 189.
[5]Somdip Dey, "SD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with Bit-Manipulation to Exclude Repetition from a Message to be Encrypted", Journal: Computing Research Repository - CoRR, vol. abs/1205. 4279, 2012.
[6]Somdip Dey,Joyshree Nath,Asoke Nath,"An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm", IJMECS, vol.4, no.5, pp.1-9, 2012.
[7]Cryptography and Network Security, William Stallings, Prentice Hall of India.
[8]Cryptography & Network Security, Behrouz A. Forouzan, Tata McGraw Hill Book Company.
[9]Cryptography and Information Security, V. K. Pachghare, Prentice Hall of India
[10]Peter Montgomery, "Modular Multiplication Without Trial Division," Math. Computation, Vol. 44, pp. 519–521, 1985.
[11]W. Hasenplaugh, G. Gaubatz, and V. Gopal, "Fast Integer Reduction," 18th IEEE Symposium on Computer Arithmetic (ARITH '07), pp. 225– 229, 2007.