RASS - A Concurrency Based Bitwise Symmetric Key Cryptographic Algorithm

被引:0
|
作者
Roy, Abhriya [1 ]
Ray, Ronit [1 ]
De, Saptarshi [1 ]
Guha, Shalini [1 ]
Goswami, Sukalyan [1 ]
Basak, Ratan Kumar [1 ]
Mukhopadhyay, Bipasha [1 ]
Chatterjee, Souvik [1 ]
Zaman, Amrin [1 ]
Nag, Sucheta [1 ]
机构
[1] Univ Engn & Management, Dept Comp Sci & Engn, Kolkata, India
关键词
cryptography; symmetric cryptography; bitwise cipher; security; concurrency; multithreading;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security and strength of any cryptosystem's encryption depend on the difficulty, both in terms of time and technique, of cracking the message. This paper suggests a bit cipher, a symmetric key cryptographic algorithm which provides bit-level security with linear time complexity and robust security (two 16 bit keys), and uses optimal time compared to other such ciphers by implementing concurrency through multithreading.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] New Cryptographic Algorithm Based on CFA
    Mushtaq, Muhammad Azhar
    Sultan, Abid
    Razzaq, Asad
    Ehsaan-ur-Rehman
    Inaam-ur-Rehman, Muhammad
    ICBDC 2019: PROCEEDINGS OF 2019 4TH INTERNATIONAL CONFERENCE ON BIG DATA AND COMPUTING, 2019, : 203 - 208
  • [42] Management of Symmetric Cryptographic Keys in Cloud Based Environment
    Fakhar, Faiza
    Shibli, Muhammad Awais
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 39 - 44
  • [43] Personalised cryptographic key generation based on FaceHashing
    Teoh, ABJ
    Ngo, DCL
    Goh, A
    COMPUTERS & SECURITY, 2004, 23 (07) : 606 - 614
  • [44] Biometrics-based cryptographic key generation
    Chang, YJ
    Zhang, WD
    Chen, TS
    2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 2203 - 2206
  • [45] A Cryptographic Algorithm Based on Hybrid Cubes
    Jamel, Sapiee
    Herawan, Tutut
    Deris, Mustafa Mat
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 175 - 187
  • [46] A Comparison between Symmetric and Asymmetric Key Encryption Algorithm based Decryption Mixnets
    Ahmad, Sahan
    Alam, Kazi Md Rokibul
    Rahman, Habibur
    Tamura, Shinsuke
    2015 INTERNATIONAL CONFERENCE ON NETWORKING SYSTEMS AND SECURITY (NSYSS), 2015, : 194 - 198
  • [47] A New Symmetric Key Encryption Algorithm based on 2-d Geometry
    Chowdhury, Mohammad Jabed Morshed
    Pal, Tapas
    ICECT: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMPUTER TECHNOLOGY, PROCEEDINGS, 2009, : 541 - +
  • [48] Research on data transmission of wireless sensor networks based on symmetric key algorithm
    Zhou, Wei
    Li, Ping
    Wang, QinJu
    Nabipour, Narjes
    MEASUREMENT, 2020, 153
  • [49] BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing
    Sohal, Manreet
    Sharma, Sandeep
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (01) : 1417 - 1425
  • [50] Specifying the needham-schroeder symmetric-key cryptographic protocol in the ambient calculus
    Qi, Minglong
    Guo, Qiping
    Zhong, Luo
    DCABES 2007 PROCEEDINGS, VOLS I AND II, 2007, : 507 - 512