Symmetric Key Algorithm Using Vernam Cipher: VSA

被引:0
|
作者
Pawar, Bhagyashri K. [1 ]
Hatkar, S. S. [1 ]
机构
[1] SGGSIE&T, CSE Dept, Nanded, India
关键词
cryptography; symmetric key cryptography; stream cipher; Ex-or operation; vernam Cipher;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Now a days people are dependent on the internet so security of data becomes a major issue including integrity. Data security is a very important aspect in this digital world. Cryptography came into the picture to provide data security. In cryptography, cryptosystem means a suite of cryptographic algorithms expected to execute a specific security most commonly for achieving confidentiality. Basically a cryptosystem consists of three algorithms: one for key generation, another for encryption and another for decryption. There are a number of algorithms using different methods to achieve security measures for data and information. This Paper elaborates an efficient and effective symmetric cryptographic algorithm using time-variant keys
引用
收藏
页码:412 / 415
页数:4
相关论文
共 50 条
  • [41] Security Features of Cloud Computing Using New Symmetric Key Algorithm
    Al-Maliki, Saeed Q. Al-Khalidi
    Alfifi, Fahad
    VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 51 - +
  • [42] Hybrid Encryption Approach Using Dynamic Key Generation and Symmetric Key Algorithm for RFID Systems
    Labbi, Zouheir
    Maarof, Ahmed
    Senhadji, Mohamed
    Belkasmi, Mostafa
    NETWORKED SYSTEMS, NETYS 2016, 2016, 9944 : 244 - 249
  • [43] A LINEAR ALGORITHM FOR BREAKING PERIODIC VERNAM CIPHERS
    LECLERC, M
    ARS COMBINATORIA, 1989, 27 : 177 - 180
  • [44] A new symmetric block cipher based on key-dependent S-boxes
    Niemiec, Marcin
    Machowski, Lukasz
    IV INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS 2012 (ICUMT), 2012, : 474 - 478
  • [45] Improvements algorithm of des cipher key based on bluetooth security mechanism
    Zhao-Hui, Yang
    Hong-Juan, Chen
    Yun-Fei, Chi
    Information Technology Journal, 2013, 12 (19) : 5107 - 5110
  • [46] A Public Key Cryptosystem Using Hiil's Cipher
    Viswanath, M. K.
    Kumar, M. Ranjith
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (1-2): : 129 - 138
  • [47] Novel Approach for Generating the Key of Stream Cipher System Using Random Forest Data Mining Algorithm
    Ali, Samaher Hussein
    2013 SIXTH INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING (DESE), 2014, : 259 - 269
  • [48] USING SIMON'S ALGORITHM TO ATTACK SYMMETRIC-KEY CRYPTOGRAPHIC PRIMITIVES
    Santoli, Thomas
    Schaffner, Christian
    QUANTUM INFORMATION & COMPUTATION, 2017, 17 (1-2) : 65 - 78
  • [49] Key-Dependent Nonlinear Component for Block Cipher Encryption Algorithm
    Khan, Waqar Ahmad
    Gondal, Muhammad Asif
    3D RESEARCH, 2014, 5 (04):
  • [50] Enhancing MD5 Hash Algorithm using Symmetric Key Encryption
    Shakya, Aman
    Karna, Nitesh
    PROCEEDINGS OF 2019 THE 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP 2019) WITH WORKSHOP 2019 THE 4TH INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2019), 2019, : 18 - 22