Symmetric Key Algorithm Using Vernam Cipher: VSA

被引:0
|
作者
Pawar, Bhagyashri K. [1 ]
Hatkar, S. S. [1 ]
机构
[1] SGGSIE&T, CSE Dept, Nanded, India
来源
2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3 | 2015年
关键词
cryptography; symmetric key cryptography; stream cipher; Ex-or operation; vernam Cipher;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Now a days people are dependent on the internet so security of data becomes a major issue including integrity. Data security is a very important aspect in this digital world. Cryptography came into the picture to provide data security. In cryptography, cryptosystem means a suite of cryptographic algorithms expected to execute a specific security most commonly for achieving confidentiality. Basically a cryptosystem consists of three algorithms: one for key generation, another for encryption and another for decryption. There are a number of algorithms using different methods to achieve security measures for data and information. This Paper elaborates an efficient and effective symmetric cryptographic algorithm using time-variant keys
引用
收藏
页码:412 / 415
页数:4
相关论文
共 50 条
  • [1] Modified OTP Based Vernam Cipher Algorithm using Multilevel Encryption Method
    Brosas, Deborah G.
    Sison, Ariel M.
    Medina, Ruji P.
    PROCEEDINGS OF THE 2019 IEEE EURASIA CONFERENCE ON IOT, COMMUNICATION AND ENGINEERING (ECICE), 2019, : 201 - 204
  • [2] TWO-DIMENSIONAL (2D) CELLULAR AUTOMATA FOR THE VERNAM CIPHER ALGORITHM IN SECRET KEY CRYPTOGRAPHY
    Constantinescu, Nicolae
    Boldea, Costin
    ANNALS OF DAAAM FOR 2009 & PROCEEDINGS OF THE 20TH INTERNATIONAL DAAAM SYMPOSIUM, 2009, 20 : 881 - 882
  • [3] Complex key generation with secured seed exchange for Vernam cipher in security applications
    Manjunatha, Vijayalaxmi
    Rao, Arjun
    Khan, Airani
    MATERIALS TODAY-PROCEEDINGS, 2021, 35 : 497 - 500
  • [4] Novel Block Cipher: Surrounding Elements Technique using Symmetric Key
    Merzah, Baler M.
    PROCEEDING OF 2021 2ND INFORMATION TECHNOLOGY TO ENHANCE E-LEARNING AND OTHER APPLICATION (IT-ELA 2021), 2021, : 142 - 147
  • [5] A structured symmetric-key block cipher
    Peyravian, M
    Coppersmith, D
    COMPUTERS & SECURITY, 1999, 18 (02) : 134 - 147
  • [6] Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
    Putera, Andysah
    Siahaan, Utama
    Rahim, Robbi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 173 - 180
  • [7] Content Based Symmetric Key Algorithm
    Shrivastava, Manish
    Jain, Shubham
    Singh, Pushkar
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 222 - 227
  • [8] Content based double encryption algorithm using symmetric key cryptography
    Chandra, Sourabh
    Mandal, Bidisha
    Alam, Sk Safikul
    Bhattacharyya, Siddhartha
    3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 1228 - 1234
  • [9] Symmetric-key block cipher for image and text cryptography
    Amador, JJ
    Green, RW
    INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2005, 15 (03) : 178 - 188
  • [10] An Enhanced Key Security of Playfair Cipher Algorithm
    Marzan, Richard M.
    Sison, Ariel M.
    2019 8TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2019), 2019, : 457 - 461