PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Symmetric Key Encryption With Many Secret Keys

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Konferencja
The Second International Conference on Research in Intelligent and Computing in Engineering
Języki publikacji
EN
Abstrakty
EN
One of the essential practices in the field of secured communication between two people is Cryptography. It confirms features like availability, authenticity, integrity and confidentiality of information. Also it enhances the mechanism of data security. For the purpose of encryption and decryption, in cryptography we have symmetric and asymmetric cryptography. Out of these, symmetric is the simplest and used widely due to its speed and feasibility in decrypting bulk messages, and requirement of limited computer resources. Symmetric key technique uses one secret key for cryptography, which opens the door for different kinds of security attacks. Through this paper I would like to introduce a Novel Symmetric key encryption and decryption using multiple secret keys. Here in this approach I am using different secret keys to encrypt different original texts.
Rocznik
Tom
Strony
335--339
Opis fizyczny
Bibliogr. 9 poz., rys., tab.
Twórcy
  • MCA Dept Saintgits College of Engineering Pathamuttom, Kottayam, Kerala
Bibliografia
  • 1. S. William, Cryptography and Network Security: Principles and practice 2nd edition, Prentice-Hall, Inc., 1999 pp 23-50.
  • 2. Aamer Nadeem, Dr M. Younus Javed, “A Performance Comparison of Data Encryption Algorithms”, First International Conference on IEEE Information and Communication Technologies (ICICT), Vol 1, Issue 6, 27-28 Aug. 2005, pp 84-89.
  • 3. S. Soni, H. Agrawal, M. Sharma, “Analysis and comparison between AES and DES Cryptographic Algorithm”, International Journal of Engineering and Innovative Technology, Vol 2, Issue 6, December 2012, pp.362-365.
  • 4. E.Surya and C. Diviya, “A Survey on Symmetric Key Encryption Algorithm s”, International Journal of Computer Science & Communication Networks,Vol 2(4), 475-477.
  • 5. Prakash Kuppuswamy, Dr.C.Chandrasekar, “Enrichment Of Security Through Cryptographic Public Key Science Algorithm Based On Block Cipher” Indian Journal of Computer and Engineering (IJCSE), Vol. 2 No. 3 Jun - Jul.2011.
  • 6. Steve Burnett & Stephen Paine RSA Security's Official Guide to Cryptography, Tata McGrawHill.
  • 7. Behrouz A. Forouzan,Cryptography & Network Security,Tata McGraw Hill..
  • 8. http://williamstallings.com/Crypto3e.html.
  • 9. http://www.cacr.math.uwaterloo.ca/hac
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-4a0d8034-d83c-48e5-bb0b-9512d9b9774a
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.