Realization of information exchange with Fibo-Q based Symmetric Cryptosystem Shaligram Prajapat Computer Applications Department MANIT MANIT Bhopal Ramjeevan Singh Thakur Computer Applications Department MANIT Bhopal (MP), India AbstractSecured information exchange is demand of e- world. Numerous techniques are being evolved and experiment to share large files. Symmetric cryptosystem based algorithm works in this direction. In this paper we have discussed result of implementation of our proposed algorithm [11] based on Fibo-Q matrix. This algorithm employs generation using automatic variability concept. The corresponding numerical analysis and effective gain has also been noticed. This approach will not only enhance the security of information but also saves computation time and reduces power requirements that will find it’s suitability for future hand held devices and online transaction processing. Keywordscipher; key; Enciphering; Decipherment; fibonacci; Q- matrix;, symmetric key algorithm, automatic variable key. I. INTRODUCTION “Security of a crypto system must be totally dependent on the secrecy of the key, not on the secrecy of algorithm” this statement of Sir Kerchoff given in 1883 is still relevant in current modern era [1]. It is also important to know keeping the algorithm secret; it would be very difficult to keep the inner working of a cryptosystem secret. Underlying algorithm can be discovered by reverse-engineering. It is safer to follow kerchoff’s principle and release the crypto-system for public reviews. Hence for a successful cryptosystem secrecy of key is important. In recent era exchange of all the information including financial and e-commerce transaction takes place among parties or entities that might not known to each other but participates in communication. During this transmission of information public network is used hence ensuring the security of these information and confidentialities of involved parties is mandatory. The information stored in computers or during information, to avoid unauthorized access or damage of information technique known as Encryption and Decryption mechanism is used. Before transmission of information Encryption and after receiving of information Decryption process is used. Securing information based on used key is classified into symmetric, asymmetric or hash. If both sender and receiver use the same key then it is symmetric cryptosystem. And if encryption and decryption key are different then it is known as asymmetric cryptosystem. In any of the situation, the used key decides the level of security of cryptosystem. There are various alternatives to control the security of a cryptosystem like Hind the Encryption, Decryption algorithms. But by doing reverse engineering if the behavior of algorithm is known then whole cryptosystem will fame. Or by increasing the key size (Increasing the key size will result in increase in key guess time or by increasing brute force attack time/trials that ultimately will increase the system security. But increasing the key size will increase the time in encryption or decryption process .By increasing computing resources or energy required to process will definitely be affected once the key length has been increased beyond a threshold. Hacker or cryptanalyst may use parallel processing; multiword computing and advanced algorithms usage may lead to compromise the system security. Another alternative in this direction we fixed up the key with a specific length and try to vary it from session to session. This approach forms the basis of self variable key based AVK- Model, in this AVK model as we fixed up the length of key to a minimum threshold then the numbers of resources are freed. Up. Since the key varies from session to session so if hacker or cryptanalysis gains the access of key of a particular session even though it is invalid for next session. So the level of security of cryptosystem is enhanced. In AVK model. Since the key changes from session to session, so the issue of new key exchange arises .To handle this issue we apply parameters AVK model that exchanges only parameters for key generation. Since on the public network only parameters are exchanged, so both sender and receiver will computer key at their own end and construct the key. The AVK approach with parameterized model is to be investigated from the perspective of hackers or cryptanalyst. The detailed analysis will decide the success of the AVK model of symmetric cryptosystem. This analysis is termed as Cryptic Mining. Cryptic mining is a set of cryptic algorithm that analyses the captured plaintext-cipher text, plaintext-key logs, parameters-key logs and captured cipher logs and provides useful knowledge, process and developing the knowledge based or AI based framework. In future cryptic mining algorithm group will be useful for auditing and classification of cryptic algorithms. Theoretically cryptic algorithms provides random ciphers, but in practice it is not so, these algorithm uses pseudo random numbers that are Corresponding Author : Shaligram Prajapat Department of Mathematics & Computer Applications, MANIT Bhopal shaligram.prajapat@gmail.com International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 2, February 2016 216 https://sites.google.com/site/ijcsis/ ISSN 1947-5500