Symmetric Key Algorithm Using Vernam Cipher: VSA

被引:0
|
作者
Pawar, Bhagyashri K. [1 ]
Hatkar, S. S. [1 ]
机构
[1] SGGSIE&T, CSE Dept, Nanded, India
来源
2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3 | 2015年
关键词
cryptography; symmetric key cryptography; stream cipher; Ex-or operation; vernam Cipher;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Now a days people are dependent on the internet so security of data becomes a major issue including integrity. Data security is a very important aspect in this digital world. Cryptography came into the picture to provide data security. In cryptography, cryptosystem means a suite of cryptographic algorithms expected to execute a specific security most commonly for achieving confidentiality. Basically a cryptosystem consists of three algorithms: one for key generation, another for encryption and another for decryption. There are a number of algorithms using different methods to achieve security measures for data and information. This Paper elaborates an efficient and effective symmetric cryptographic algorithm using time-variant keys
引用
收藏
页码:412 / 415
页数:4
相关论文
共 50 条
  • [41] Hardware implementation of block cipher algorithm
    School of Computer, Wuhan University, Wuhan 430079, China
    不详
    Harbin Gongye Daxue Xuebao, 2006, 9 (1558-1562):
  • [42] Genetic Algorithm in Stream Cipher Cryptanalysis
    Polak, Iwona
    Boryczka, Mariusz
    COMPUTATIONAL COLLECTIVE INTELLIGENCE (ICCCI 2015), PT II, 2015, 9330 : 149 - 158
  • [43] A New Symmetric Key Encryption Algorithm based on 2-d Geometry
    Chowdhury, Mohammad Jabed Morshed
    Pal, Tapas
    ICECT: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMPUTER TECHNOLOGY, PROCEEDINGS, 2009, : 541 - +
  • [44] Enhancing File Security by using Vigenere Cipher and Even Rodeh Code Algorithm
    Rachmawati, Dian
    Budiman, Mohammad Andri
    Batubara, Maria Magdalena
    2018 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS AND ITS APPLICATIONS (IC3INA), 2018, : 54 - 59
  • [45] K2: A stream cipher algorithm using dynamic feedback control
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    Sakurai, Kouichi
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 204 - +
  • [46] Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box
    Tsunoo, Yukiyasu
    Saito, Teruo
    Kubo, Hiroyasu
    Suzaki, Tomoyasu
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2008, 5308 : 128 - +
  • [47] Using a Chaotic Cipher to Encrypt Ethernet Traffic
    Perez-Resa, A.
    Garcia-Bosque, M.
    Sanchez-Azqueta, C.
    Celma, S.
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [48] A comparative survey of symmetric and asymmetric key cryptography
    Chandra, Sourabh
    Paira, Smita
    Alam, Sk Safikul
    Sanyal, Goutam
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATION AND COMPUTATIONAL ENGINEERING (ICECCE), 2014, : 83 - 93
  • [49] A Tweakable Key Alternating Lightweight Cipher for Internet of Things
    Shamala, Mary L.
    Zayaraz, G.
    Vivekanandan, K.
    Vijayalakshmi, V.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (04) : 113 - 133
  • [50] Improved Key Recovery Attack on the BEAN Stream Cipher
    Wang, Hui
    Hell, Martin
    Johansson, Thomas
    Agren, Martin
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1437 - 1444