RASS - A Concurrency Based Bitwise Symmetric Key Cryptographic Algorithm

被引:0
|
作者
Roy, Abhriya [1 ]
Ray, Ronit [1 ]
De, Saptarshi [1 ]
Guha, Shalini [1 ]
Goswami, Sukalyan [1 ]
Basak, Ratan Kumar [1 ]
Mukhopadhyay, Bipasha [1 ]
Chatterjee, Souvik [1 ]
Zaman, Amrin [1 ]
Nag, Sucheta [1 ]
机构
[1] Univ Engn & Management, Dept Comp Sci & Engn, Kolkata, India
来源
2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON) | 2016年
关键词
cryptography; symmetric cryptography; bitwise cipher; security; concurrency; multithreading;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security and strength of any cryptosystem's encryption depend on the difficulty, both in terms of time and technique, of cracking the message. This paper suggests a bit cipher, a symmetric key cryptographic algorithm which provides bit-level security with linear time complexity and robust security (two 16 bit keys), and uses optimal time compared to other such ciphers by implementing concurrency through multithreading.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM BASED ON LOGARITHMIC FUNCTION
    Nema, Preksha
    Rizvi, M. A.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 757 - 762
  • [2] USING SIMON'S ALGORITHM TO ATTACK SYMMETRIC-KEY CRYPTOGRAPHIC PRIMITIVES
    Santoli, Thomas
    Schaffner, Christian
    QUANTUM INFORMATION & COMPUTATION, 2017, 17 (1-2) : 65 - 78
  • [3] Content Based Symmetric Key Algorithm
    Shrivastava, Manish
    Jain, Shubham
    Singh, Pushkar
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 222 - 227
  • [4] Evaluation of cryptographic key generation performance using evolutionary algorithm
    M. Ragavan
    K. Prabu
    International Journal of System Assurance Engineering and Management, 2022, 13 : 481 - 487
  • [5] Evaluation of cryptographic key generation performance using evolutionary algorithm
    Ragavan, M.
    Prabu, K.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022, 13 (SUPPL 1) : 481 - 487
  • [6] A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case
    Shrimpton, Thomas
    Stam, Martijn
    Warinschi, Bogdan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 277 - 307
  • [7] BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing
    Sohal, Manreet
    Sharma, Sandeep
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (01) : 1417 - 1425
  • [8] A CRYPTOGRAPHIC ALGORITHM BASED ON AES CIPHER ANDNON-DETERMINISTIC ALGORITHM APPROACH FOR KEY GENERATION
    Ofosu, Amoah Emmanuel
    Kester, Quist-Aphetsi
    Anyanewah, Attah Josephine Akosua
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, COMPUTATIONAL MODELLING AND APPLICATIONS (ICCMA), 2019, : 105 - 109
  • [9] A New Symmetric Key Encryption Algorithm With Higher Performance
    Murtaza, Abid
    Pirzada, Syed Jahanzeb Hussain
    Liu Jianwei
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING, MATHEMATICS AND ENGINEERING TECHNOLOGIES (ICOMET), 2019,
  • [10] ACAFP: Asymmetric Key based Cryptographic Algorithm using Four Prime Numbers to Secure Message Communication. A Review on RSA Algorithm
    Chaudhury, Punit
    Dhang, Susmita
    Roy, Monpreet
    Deb, Saurav
    Saha, Jyotirmoy
    Mallik, Aditya
    Bal, Sauvik
    Roy, Saraswata
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    Das, Rupayan
    2017 8TH ANNUAL INDUSTRIAL AUTOMATION AND ELECTROMECHANICAL ENGINEERING CONFERENCE (IEMECON), 2017, : 332 - 337