Symmetric Key Algorithm Using Vernam Cipher: VSA

被引:0
|
作者
Pawar, Bhagyashri K. [1 ]
Hatkar, S. S. [1 ]
机构
[1] SGGSIE&T, CSE Dept, Nanded, India
来源
2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3 | 2015年
关键词
cryptography; symmetric key cryptography; stream cipher; Ex-or operation; vernam Cipher;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Now a days people are dependent on the internet so security of data becomes a major issue including integrity. Data security is a very important aspect in this digital world. Cryptography came into the picture to provide data security. In cryptography, cryptosystem means a suite of cryptographic algorithms expected to execute a specific security most commonly for achieving confidentiality. Basically a cryptosystem consists of three algorithms: one for key generation, another for encryption and another for decryption. There are a number of algorithms using different methods to achieve security measures for data and information. This Paper elaborates an efficient and effective symmetric cryptographic algorithm using time-variant keys
引用
收藏
页码:412 / 415
页数:4
相关论文
共 50 条
  • [31] Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm
    Geetha, R.
    Padmavathy, T.
    Thilagam, T.
    Lallithasree, A.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (01) : 21 - 36
  • [32] Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm
    R. Geetha
    T. Padmavathy
    T. Thilagam
    A. Lallithasree
    Wireless Personal Communications, 2020, 112 : 21 - 36
  • [33] SMS Encryption and Decryption Using Modified Vigenere Cipher Algorithm
    Ahamed, B. Bazeer
    Krishnamoorthy, Murugan
    JOURNAL OF THE OPERATIONS RESEARCH SOCIETY OF CHINA, 2022, 10 (04) : 835 - 848
  • [34] Weak key analysis for chaotic cipher based on randomness properties
    Yin RuMing
    Wang Jian
    Yuan Jian
    Shan XiuMing
    Wang XiQin
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (05) : 1162 - 1171
  • [35] RASS - A Concurrency Based Bitwise Symmetric Key Cryptographic Algorithm
    Roy, Abhriya
    Ray, Ronit
    De, Saptarshi
    Guha, Shalini
    Goswami, Sukalyan
    Basak, Ratan Kumar
    Mukhopadhyay, Bipasha
    Chatterjee, Souvik
    Zaman, Amrin
    Nag, Sucheta
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [36] Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study
    Manasrah, Ahmad M.
    Al-Din, Basim Najim
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1450 - 1461
  • [37] URESC, Unbalanced Rotor Enhanced Symmetric Cipher
    ElKamchouchi, H.
    ElShafee, A.
    2008 IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1 AND 2, 2008, : 77 - 81
  • [38] Using data compression and randomisation to build an unconditionally secure short key cipher
    Ryabko, Boris
    2022 IEEE INFORMATION THEORY WORKSHOP (ITW), 2022, : 238 - 242
  • [39] ENHANCED COST EFFECTIVE SYMMETRIC KEY ALGORITHM FOR SMALL AMOUNT OF DATA
    Kumar, R. Satheesh
    Pradeep, E.
    Naveen, K.
    Gunasekaran, R.
    2010 INTERNATIONAL CONFERENCE ON SIGNAL ACQUISITION AND PROCESSING: ICSAP 2010, PROCEEDINGS, 2010, : 354 - 357
  • [40] Chaotic encryption algorithm based on alternant of stream cipher and block cipher
    Xingyuan Wang
    Xiaojuan Wang
    Jianfeng Zhao
    Zhenfeng Zhang
    Nonlinear Dynamics, 2011, 63 : 587 - 597