Shikha Gupta : Department of Information Technology ,University School of Communication and Technology,
Guru Gobind Singh Indraprastha University, Sector 16 C, New Delhi-110078, India
Priyanka Bhutani : Department of Information Technology ,University School of Communication and Technology,
Guru Gobind Singh Indraprastha University, Sector 16 C, New Delhi-110078, India
Ridhi Nim : Department of Information Technology ,University School of Communication and Technology,
Guru Gobind Singh Indraprastha University, Sector 16 C, New Delhi-110078, India
[1] N. Yuhanna, “Your Enterprise Database Security
Strategy 2010”, Forrester Research, September 2009.
[2] Paulraj pooniah, “Data Warehousing Fundamentals-A
comprehensive guide for IT professionals”, John Wiley
and sons, 2001.
[3] Terence Spies "Format Preserving Encryption", Voltage
Security, Inc.
[4] H. E. Smith and M. Brightwell, "Using Data type-
Preserving Encryption to Enhance Data Warehouse
Security", NIST 20th National Information Systems
Security Conference, pp.141, 1997.
[5] V. Hoang and P. Rogaway, "On generalized Feistel
networks", Conference version of this paper, CRYPTO
2010, Springer, 2010.
[6] Kurra Mallaiah, S. Ramachandram, ”Performance
analysis of Format preserving encryption over block
ciphers for numeric data”, 2013 4th International
conference on computer and communication technology.
[7] M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers,
"Format-preserving encryption", SAC 2009. LNCS
5867, Springer, 2009.
[8] M. Bellare, P. Rogaway, and T. Spies, "The FFX mode
of operation for format-preserving encryption"
(Draft1.1).February, 2010, Manuscript (standards
proposal) submitted to NIST.
[9] J. Black and P. Rogaway, "Ciphers with Arbitrary Finite
Domains". RSA Data Security Conference,
Cryptographer's Track (RSA CT '02), Lecture Notes in
Computer Science, vol. 2271, pp. 114-130, Springer,
2002.
[10] AES, “Advanced Encryption Standard”, National Inst. of
Standards and Technology (NIST), FIPS-197, 2001.
[11] Jia, Z Liu, J Li, Z Dong “A new integer FPE scheme
based on Feistel Network”, Advances in Electric and
Electronic, 2012, Springer.
[12] www.verifone.com/sites/verishield-protect.aspx
[13] National Institute of Standards and Technology. NIST
Special Publication 800-38A: Recommendation for Block
Cipher Modes of Operation—Methods and Techniques,
December, 2001.