SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM BASED ON LOGARITHMIC FUNCTION

被引:0
作者
Nema, Preksha [1 ]
Rizvi, M. A. [1 ]
机构
[1] Natl Inst Tech Teachers Training & Res, Dept Comp Engn & Applicat, Bhopal, MP, India
来源
2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015) | 2015年
关键词
Cryptography; Logarithmic function; Boolean operations; Encryption; Decryption;
D O I
10.1109/CSNT.2015.188
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Current era is cyber era, mostly people are dependent on online task, to keep the message secure from the hackers and crackers there is need of strong cryptography. Hackers are becoming intelligent day by day to attack on data as per their experience gain. Cryptography is a private communication in the public world. A cryptosystem should be secure even if the attacker (intruder) knows all the details about the system, with the exception of secret key. After going into the details of various existing cryptographic algorithms, it is strongly felt that a new strong mechanism should be developed, so there is a need to develop a cryptographic algorithm which should be strong enough to crack. In this paper an attempt has been made to develop a new algorithm, based on matrix, Boolean operations and logarithmic function that will surely improve the overall security with higher efficiency.
引用
收藏
页码:757 / 762
页数:6
相关论文
共 11 条
[1]  
Cole E., 2005, NETWORK SECURITY BIB
[2]  
Dev Soumyabrata, RANDOMIZED CRYPTOGRA
[3]  
Devi T.R., 2013, INT C COMM SYST NETW
[4]  
Jeyanthi N., 2014, INT S NETW COMP COMM
[5]  
Kandele Nehal, 2012, INT J COMPUTER TECHN, V2
[6]  
Kumar Niraj, 2013, AUT COMP COMM CONTR
[7]  
Paul Manas, 2012, INT J ADV INFORM TEC, V2, P29, DOI [10.5121/ijait.2012.2203, DOI 10.5121/IJAIT.2012.2203]
[8]  
Sarker M.Z.H., 2005, 9 INT MULT C IEEE IN
[9]  
Sastry V. U. K., 2013, INT J ENG SCI, V2
[10]  
Stallings W., 2007, Cryptography and Network Security, VFourth