RASS - A Concurrency Based Bitwise Symmetric Key Cryptographic Algorithm

被引:0
|
作者
Roy, Abhriya [1 ]
Ray, Ronit [1 ]
De, Saptarshi [1 ]
Guha, Shalini [1 ]
Goswami, Sukalyan [1 ]
Basak, Ratan Kumar [1 ]
Mukhopadhyay, Bipasha [1 ]
Chatterjee, Souvik [1 ]
Zaman, Amrin [1 ]
Nag, Sucheta [1 ]
机构
[1] Univ Engn & Management, Dept Comp Sci & Engn, Kolkata, India
来源
2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON) | 2016年
关键词
cryptography; symmetric cryptography; bitwise cipher; security; concurrency; multithreading;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security and strength of any cryptosystem's encryption depend on the difficulty, both in terms of time and technique, of cracking the message. This paper suggests a bit cipher, a symmetric key cryptographic algorithm which provides bit-level security with linear time complexity and robust security (two 16 bit keys), and uses optimal time compared to other such ciphers by implementing concurrency through multithreading.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Multi-Biometrics Based Cryptographic Key Regeneration Scheme
    Kanade, Sanjay
    Petrovska-Delacretaz, Dijana
    Dorizzi, Bernadette
    2009 IEEE 3RD INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS, 2009, : 333 - 339
  • [32] An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms
    Njuki, Sam
    Zhang, Jianbiao
    Too, Edna C.
    Richard, Rimiru
    PROCEEDINGS OF THE 2018 2ND INTERNATIONAL CONFERENCE ON ALGORITHMS, COMPUTING AND SYSTEMS (ICACS 2018), 2018, : 14 - 20
  • [33] Developing a Lightweight Cryptographic Algorithm Based on DNA Computing
    Kubba, Zaid M. Jawad
    Hoomod, Haider K.
    8TH INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY (ICAST 2020), 2020, 2290
  • [34] Image cryptographic algorithm based on the Haar wavelet transform
    Tedmori, Sara
    Al-Najdawi, Nijad
    INFORMATION SCIENCES, 2014, 269 : 21 - 34
  • [35] VLSI Implementation of Boolean Algebra based Cryptographic Algorithm
    Ammu, S.
    Ajai, Remya A. S.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2102 - 2105
  • [36] Adaptive Key Management-Based Cryptographic Algorithm for Privacy Preservation in Wireless Mobile Adhoc Networks for IoT Applications
    Pamarthi, Satyanarayana
    Narmadha, R.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (01) : 349 - 376
  • [37] Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present Status
    Imam, Raza
    Areeb, Qazi Mohammad
    Alturki, Abdulrahman
    Anwer, Faisal
    IEEE ACCESS, 2021, 9 : 155949 - 155976
  • [38] Differential Power Analysis Attacks to Precharged Buses: A General Analysis for Symmetric-Key Cryptographic Algorithms
    Alioto, Massimo
    Poll, Massimo
    Rocchi, Santina
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (03) : 226 - 239
  • [39] A secured cryptographic system based on DNA and a hybrid key generation approach
    Reddy, M. Indrasena
    Kumar, A. P. Siva
    Reddy, K. Subba
    BIOSYSTEMS, 2020, 197
  • [40] Cryptographic Key Generator Candidates based on Smartphone built-in Sensors
    Marghescu, Andrei
    Teseleanu, George
    Svasta, Paul
    2014 IEEE 20TH INTERNATIONAL SYMPOSIUM FOR DESIGN AND TECHNOLOGY IN ELECTRONIC PACKAGING (SIITME), 2014, : 239 - 243