Published Paper


Chakravyuh-Inspired Multi-Layered Encryption (CIME) to Enhance Security at the Field of Cyber Attacks

Ritadrik Chowdhury1, Kallol Acharjee2, Prolay Ghosh3, Priya Majumdar
JIS College of Engineering, Kalyani, India
Page: 234-246
Published on: 2025 March

Abstract

The "Chakravyuh," an ancient war formation as described in the Indian epic Mahabharata, is a very complex multi-layered spiral formation of soldiers that is intended to trap and exhaust the enemy. This formation offers concentric defensive layers with each successive level requiring specific knowledge and strategy to penetrate. It was the young warrior Abhimanyu who had entered the Chakravyuh but was unable to escape from it, due to his lack of knowledge of certain important tactics. The Chakravyuh thus symbolizes a strong defensive formation as well as a trap whose purpose was to distract, delay, and immobilize the enemy. Inspired by this ancient construct, we present here a new cryptographic model: the Chakravyuh Cryptographic Scheme, incorporating these tenets in the digital world. Chakravyuh structure is much like the encryption system of several layers each being an increasingly complex code. And in this model, too, every layer of the said codes must be cracked in order as depicted above. Just as the formation in the Mahabharata is designed to be selectively penetrable, this cryptographic scheme makes sure that unauthorized access becomes exponentially harder with each successive layer. It relies on dynamically changing keys and access permissions; in other words, it functions as the cyclic and deceitful nature of the Chakravyuh, which defends attacks by containing adversaries within layers of encrypted data. In this architecture, when an attacker fails to decrypt one layer, it throws the attacker into a different level of encryption, effectively locking him/her in a cycle like how the soldiers formed the Chakravyuh that eventually trapped and suffocated Abhimanyu. This method secures the data through multi-level complexity; prevents brute force attacks as well as direct access, hence protects the core data.

 

PDF