International Journal of Electrical and Computer Engineering (IJECE) Vol. No. February 2017, pp. ISSN: 2088-8708. DOI: 10. 11591/ijece. Symmetric Key based Encryption and Decryption using Lissajous Curve Equations Santhosh Kumar B. Kruthika Vijay Department of Computer Science. Amrita school of Arts and Sciences. Amrita Vishwa Vidyapeetham. Amrita University Mysuru Campus. Karnataka. India Article Info ABSTRACT Article history: Sender and receiver both uses two large similar prime numbers and uses parametric equations for swapping values of kx and by product of kx and ky is the common secret key. Generated secret key is used for encryption and decryption using ASCII key matrix of order 16X16. Applying playfair rules for encryption and decryption. Playfair is a digraph substitution cipher. Playfair makes use of pairs of letters for encryption and decryption. This application makes use of all ASCII characters which makes brute force attack Received Oct 12, 2016 Revised Jan 15, 2017 Accepted Jan 30, 2017 Keyword: ASCII: American standard code for information interchange Decryption Encryption Key exchange Copyright A 2017 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Kruthika Vijay Department of Computer Science. Amrita school of Arts and sciences. Amrita Vishwa Vidyapeetham. Amrita University. Mysuru Campus. Karnataka. India. Email: kruthikavijay92@gmail. INTRODUCTION Symmetric key makes use of same key for encryption and decryption. Symmtric key is confidential for encrypting a plaintext and decryption of plaintext. This application makes use of lissajous cuve equations for key. Plaintext is combined with key for encryption using 16 x 16 square matrix. Applying playfair . rules for encryption and inverse rules for decryption with same square matrix. Symmetric key playfair cipher is an alphabetic cipher. This application makes use of alphanumeric and special characters for encryption and RESEARCH METHOD The methodology used in this application is: Key exchange mechanism. Encryption and decryption In this application parametric equations are used for secure exchange of keys. Lissajous curves equation can be represented ascan be used for two users need to exchange private keys a and b be two large prime numbersAo can take values from trigonometric table values and t=1. This is a prerequisite be followed by a sender and recipient. User A KEY generation: a=35761 Journal homepage: http://iaesjournal. com/online/index. php/IJECE IJECE ISSN: 2088-8708 b=35761 kx=30 . n radian. ky=120 secret key = 38502543 dy/dx=(-b*cos. * k. *sin. * k. substituting above values into the equation. User B KEY generation: a=34551 b=34551 kx=30 . n radian. ky=120 dy/dx=(-b*cos. * k. *sin. * k. substituting above values into the equation. Exchange the values of user AAos kx value to user B and User BAos ky value to user A. When substituted the value of kx and ky common secret key is generated. Both users arrive at a common number. This common secret key can be further used for encryption and decryption. Key Plain text Figure 1 shows ASCII Key Matrix Figure 1. ASCII Key Matrix Encryption. Encryption process makes use of ASCII key table or square matrix without repetition and characters are arranged in a 16X16 grid. Symmetric Key Based Encryption and Decryption using Lissajous Curve Equations (Santhosh Kumar B. ISSN: 2088-8708 Rules: Plaintext letter pair repeated in row are separated with a filler letter, such as x to lx,lo so on. Pick element to right of each letter and left wrap if required. For example. CD is encrypted as DE. Pick element to below each letter and top wrap if required. For example, mu is encrypted as CM. Otherwise, pick same rows opposite corners. The element forms corners of a rectangle. For example BRbecomes Rb. Decryption is reverse . of the last rules. Encrypting a message: Auenemy killedAy Key Plain text Cipher text MAo Decryption: Decryption is reverse of encryption. Considering the ASCII key matrix for decryption. Au5cAy lies in the corners of the rectangle. The order is important Ae the first character of the encrypted pair is the one that lies on the same row as the first character of the cipher text pair. So Au5cAy can be decrypted as Au3eAy and so on. You will be getting the key with plain Cipher text Key Plain text MAo RESULTS AND ANALYSIS In this section, it is explained the results of research and at the same time is given the comprehensive discussion. Results can be presented in figures, graphs, tables and others that make the reader understand easily . , . The discussion can be made in several sub-chapters. CONCLUSION In this application, new requirement of symmetric key exchange with lissajous curve equations. This application also makes of exchanging secret key between two users using symmetric scheme. Using secret key generated can be used for encryption and decryption. This application makes use of novel method and high security cryptography technique using lissajous curve equations. To provide integrity of any message, message authentication scheme can be applied. It helps to ensure the information secure. Many researches are yet to be identified in future. To provide a better mechanism using asymmetric key exchange lile RSA or DHKE. REFERENCES