RASS - A Concurrency Based Bitwise Symmetric Key Cryptographic Algorithm

被引:0
|
作者
Roy, Abhriya [1 ]
Ray, Ronit [1 ]
De, Saptarshi [1 ]
Guha, Shalini [1 ]
Goswami, Sukalyan [1 ]
Basak, Ratan Kumar [1 ]
Mukhopadhyay, Bipasha [1 ]
Chatterjee, Souvik [1 ]
Zaman, Amrin [1 ]
Nag, Sucheta [1 ]
机构
[1] Univ Engn & Management, Dept Comp Sci & Engn, Kolkata, India
来源
2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON) | 2016年
关键词
cryptography; symmetric cryptography; bitwise cipher; security; concurrency; multithreading;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security and strength of any cryptosystem's encryption depend on the difficulty, both in terms of time and technique, of cracking the message. This paper suggests a bit cipher, a symmetric key cryptographic algorithm which provides bit-level security with linear time complexity and robust security (two 16 bit keys), and uses optimal time compared to other such ciphers by implementing concurrency through multithreading.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A Discrete Wavelet Transform based Cryptographic algorithm
    Goswami, Debayan
    Rahman, Naushad
    Biswas, Jayanta
    Koul, Anshu
    Tamang, Rigya Lama
    Bhattacharjee, A. K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 178 - 182
  • [22] A novel combined cryptographic and hash algorithm based on chaotic control character
    Deng, Shaojiang
    Xiao, Di
    Li, Yantao
    Peng, Wenbin
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2009, 14 (11) : 3889 - 3900
  • [23] An Approach to Cryptographic Key Distribution Through Fingerprint Based Key Distribution Center
    Barman, Subhas
    Chattopadhyay, Samiran
    Samanta, Debasis
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1629 - 1635
  • [24] Security of internet of things based on cryptographic algorithm
    Mittal, Sonam
    Singh, Soni
    Balakumaran, D.
    Hemalatha, K.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (01) : 28 - 39
  • [25] Design and Implementation of DNA Based Cryptographic Algorithm
    Pradeeksha, Shirley A.
    Sathyapriya, Sridevi S.
    2020 5TH INTERNATIONAL CONFERENCE ON DEVICES, CIRCUITS AND SYSTEMS (ICDCS' 20), 2020, : 299 - 302
  • [26] Proposed Symmetric Key Cryptography Algorithm for Data Security
    Anand, Abhishek
    Raj, Abhishek
    Kohli, Rashi
    Bibhu, Vimal
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 159 - 162
  • [27] Symmetric Key Algorithm Using Vernam Cipher: VSA
    Pawar, Bhagyashri K.
    Hatkar, S. S.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 412 - 415
  • [28] Breaking (and Fixing) Channel-based Cryptographic Key Generation: A Machine Learning Approach
    Alouani, Ihsen
    2022 25TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2022, : 383 - 390
  • [29] DES: The Oldest Symmetric Block Key Encryption Algorithm
    Sharma, Mukta
    Garg, R. B.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2016), 2016, : 53 - 58
  • [30] Security in Opportunistic Sensor Network and IoT having Sensors using Light Weight Key Generation and Cryptographic Algorithm
    Arafath, Mohammed Salman
    Khan, Khaleel Ur Rahman
    Sunitha, K. V. N.
    2018 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ELECTRICAL, ELECTRONICS & COMMUNICATION ENGINEERING (ICRIEECE 2018), 2018, : 3427 - 3433