A New Hybrid Symmetric-key Technique to Enhance Data Security of Textual Information using Random Number Generator

被引:0
作者
Rakshitha [1 ]
Dodmane, Radhakrishna [1 ]
机构
[1] NMAMIT, Dept CSE, Nitte, Karnataka, India
来源
PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON) | 2017年
关键词
AES; Fiestel; RSA; Random generators; multilevel security; textual information;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Now a days transferring of texts, documents over the Internet are the tasks in common. The transferred text must be cryptographically protected so that cannot be accessed by the invaders. In the communication medium, protected data uses cryptographic techniques and random bit generators. Once the key is generated by the random generators, how well we can secure and transmit fast in the network plays a vital role by applying appropriate algorithm. As a solution, a system is developed by symmetric algorithmic approach, uses AES and Fiestel content and also implements three different ways of random generators such as pseudorandom number generator (PRNG), linear multiples of prime sequence based method and nonlinear prime methods. Multilevel encryption and decryption techniques are adopted in the solution to transfer the information over the network securely with reduced delay. This method provides very strong technique against different kinds of attacks.
引用
收藏
页码:1438 / 1442
页数:5
相关论文
共 11 条
  • [1] Agarwal K, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4)
  • [2] [Anonymous], 2013, INT J INNOVATIVE RES
  • [3] Ferguson N., 2010, Cryptography Engineering: Design Principles and Practical Applications
  • [4] Kumar Aman, 2012, INT J ADV RES COMPUT, V2
  • [5] Kumar Aman, IJEIM 0067, V1, P201
  • [6] Kumar Yogesh, 2011, IJCMS OCT
  • [7] An Algorithm for Constructing a Minimal Register with Non-Linear Update Generating a Given Sequence
    Li, Nan
    Dubrova, Elena
    [J]. 2014 IEEE 44TH INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC (ISMVL 2014), 2014, : 254 - 259
  • [8] Pseudo-random sequence generators with improved inviolability performance
    Mita, R.
    Palumbo, G.
    Poli, M.
    [J]. IEE PROCEEDINGS-CIRCUITS DEVICES AND SYSTEMS, 2006, 153 (04): : 375 - 382
  • [9] Patil Anup Ashok, 2016, IEEE, DOI [10.1109/1.CACCS.2016.7586356, DOI 10.1109/1.CACCS.2016.7586356]
  • [10] Stallings W., 2010, Cryptography and Network Security: Principles and Practice, V5