RASS - A Concurrency Based Bitwise Symmetric Key Cryptographic Algorithm

被引:0
|
作者
Roy, Abhriya [1 ]
Ray, Ronit [1 ]
De, Saptarshi [1 ]
Guha, Shalini [1 ]
Goswami, Sukalyan [1 ]
Basak, Ratan Kumar [1 ]
Mukhopadhyay, Bipasha [1 ]
Chatterjee, Souvik [1 ]
Zaman, Amrin [1 ]
Nag, Sucheta [1 ]
机构
[1] Univ Engn & Management, Dept Comp Sci & Engn, Kolkata, India
关键词
cryptography; symmetric cryptography; bitwise cipher; security; concurrency; multithreading;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security and strength of any cryptosystem's encryption depend on the difficulty, both in terms of time and technique, of cracking the message. This paper suggests a bit cipher, a symmetric key cryptographic algorithm which provides bit-level security with linear time complexity and robust security (two 16 bit keys), and uses optimal time compared to other such ciphers by implementing concurrency through multithreading.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM BASED ON LOGARITHMIC FUNCTION
    Nema, Preksha
    Rizvi, M. A.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 757 - 762
  • [2] Efficient key management methods for symmetric cryptographic algorithm
    Sreehari, K. N.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 377 - 380
  • [3] The analysis and implementation of the symmetric key cryptographic algorithm based on the algebraic Paley graphs
    Oumazouz, Zhour
    Karim, Driss
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2022, 17 (04): : 1563 - 1567
  • [4] A cost effective symmetric key cryptographic algorithm for small amount of data
    Sarker, Mohammad Zakir Hossain
    Parvez, Shafiul
    Proceedings of the INMIC 2005: 9th International Multitopic Conference - Proceedings, 2005, : 225 - 230
  • [5] USING SIMON'S ALGORITHM TO ATTACK SYMMETRIC-KEY CRYPTOGRAPHIC PRIMITIVES
    Santoli, Thomas
    Schaffner, Christian
    QUANTUM INFORMATION & COMPUTATION, 2017, 17 (1-2) : 65 - 78
  • [6] Content Based Symmetric Key Algorithm
    Shrivastava, Manish
    Jain, Shubham
    Singh, Pushkar
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 222 - 227
  • [7] Performance Analysis of Symmetric Key Cryptographic Algorithms
    Vyakaranal, Shashidhara
    Kengond, Shivaraj
    PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 411 - 415
  • [8] Cloud Security Architecture Based on User Authentication and Symmetric Key Cryptographic Techniques
    Wani, Abdul Raoof
    Rana, Q. P.
    Pandey, Nitin
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 529 - 534
  • [9] dSCADL: A Data Flow based Symmetric Cryptographic Algorithm Description Language
    Rao, Jinli
    Zou, Xuecheng
    Dai, Kui
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 84 - 89
  • [10] Design and Implementation of the Components of the Symmetric Cryptographic Algorithm
    Ci, Yunfei
    Shi, Guozhen
    Yang, Feng
    Diao, Jiawen
    Liu, Cuijie
    Mao, Weihua
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 483 - 487