RASS - A Concurrency Based Bitwise Symmetric Key Cryptographic Algorithm

被引:0
|
作者
Roy, Abhriya [1 ]
Ray, Ronit [1 ]
De, Saptarshi [1 ]
Guha, Shalini [1 ]
Goswami, Sukalyan [1 ]
Basak, Ratan Kumar [1 ]
Mukhopadhyay, Bipasha [1 ]
Chatterjee, Souvik [1 ]
Zaman, Amrin [1 ]
Nag, Sucheta [1 ]
机构
[1] Univ Engn & Management, Dept Comp Sci & Engn, Kolkata, India
关键词
cryptography; symmetric cryptography; bitwise cipher; security; concurrency; multithreading;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security and strength of any cryptosystem's encryption depend on the difficulty, both in terms of time and technique, of cracking the message. This paper suggests a bit cipher, a symmetric key cryptographic algorithm which provides bit-level security with linear time complexity and robust security (two 16 bit keys), and uses optimal time compared to other such ciphers by implementing concurrency through multithreading.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Two-Key Dependent Permutation for Use in Symmetric Cryptographic System
    Kuppusamy, Arulmani
    Iyer, Swaminathan Pitchai
    Krithivasan, Kannan
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [32] Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software
    Dodis, Yevgeniy
    Luo, Weiliang
    Xu, Shouhuai
    Yung, Moti
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [33] New Symmetric Key Generation Algorithm
    Naiem, Ghada Farouk
    Elramly, Salwa
    Hasan, Bahaa Eldin M.
    Shehata, Khaled
    NRSC: 2009 NATIONAL RADIO SCIENCE CONFERENCE: NRSC 2009, VOLS 1 AND 2, 2009, : 446 - 453
  • [34] A SYMMETRIC KEY DYNAMIC GATES ENCRYPTION ALGORITHM BASED ON QUANTUM COMPUTING
    Moussa, Karim H.
    Abd-Elbaset, Mohamed
    Abouelseoud, Yasmine
    Elkamchochi, Hassan M.
    PROCEEDINGS OF 2021 38TH NATIONAL RADIO SCIENCE CONFERENCE (NRSC), 2021, : 109 - 116
  • [35] Content based double encryption algorithm using symmetric key cryptography
    Chandra, Sourabh
    Mandal, Bidisha
    Alam, Sk Safikul
    Bhattacharyya, Siddhartha
    3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 1228 - 1234
  • [36] Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis
    Kholidy, Hisham A.
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [37] Evaluation of cryptographic key generation performance using evolutionary algorithm
    M. Ragavan
    K. Prabu
    International Journal of System Assurance Engineering and Management, 2022, 13 : 481 - 487
  • [38] Evaluation of cryptographic key generation performance using evolutionary algorithm
    Ragavan, M.
    Prabu, K.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022, 13 (SUPPL 1) : 481 - 487
  • [39] Cryptographic key exchange based on locationing information
    Naik, Piyush
    Ravichandran, Karthikeyan
    Sivalingam, Krishna M.
    PERVASIVE AND MOBILE COMPUTING, 2007, 3 (01) : 15 - 35
  • [40] A Symmetric Key Cryptographic Encryption Technique of MPEG Digital Video Images Based on RGB Pixel Transposition and Shuffling
    Kester, Quist-Aphetsi
    Nana, Laurent
    Pascu, Anca Christine
    Gire, Sophie
    Eghan, Jojo M.
    Quaynor, Nii Narku
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (04): : 192 - 199