Key Algorithm

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 241245 Experts worldwide ranked by ideXlab platform

Prakash Kuppuswamy - One of the best experts on this subject based on the ideXlab platform.

  • securing e commerce business using hybrid combination based on new symmetric Key and rsa Algorithm
    MIS REVIEW:An International Journal, 2014
    Co-Authors: Prakash Kuppuswamy, Saeed Q Y Alkhalidi
    Abstract:

    Security in e-commerce is becoming more topical as the shift from traditional shopping and transactions move away from physical stores to online. E-commerce has had a drastic effect on the global economy and has rapidly accelerated over the years into the trillions of dollars a year. Protecting payment web application users and application systems requires a combination of managerial, technical and physical controls. In this paper, we propose hybrid cryptographic system that combines both the symmetric Key Algorithm, and popular RSA Algorithm. The symmetric Key Algorithm based on integer numbers and RSA Algorithm widely using in all data security application. Efficiency of the security methods are dignified and such competence increases as we combined security methods with each other.

  • hybrid encryption decryption technique using new public Key and symmetric Key Algorithm
    International Journal of Information and Computer Security, 2014
    Co-Authors: Prakash Kuppuswamy, Saeed Q Y Alkhalidi
    Abstract:

    This research study proposes hybrid encryption system using new public Key Algorithm and private Key Algorithm. A hybrid cryptosystem is one which combines the convenience of a public-Key cryptosystem with the efficiency of a symmetric-Key cryptosystem. Here, we propose a provably two way secured data encryption system, which addresses the concerns of user's privacy, authentication and accuracy. This system has two different encryption Algorithms which have been used both in the encryption and decryption sequence. One is public Key cryptography based on linear block cipher another one is private Key cryptography based on simple symmetric Algorithm. This cryptography Algorithm provides more security as well as authentication comparing to other existing hybrid Algorithm.

  • Hybrid encryption/decryption technique using new public Key and symmetric Key Algorithm
    International Journal of Information and Computer Security, 2014
    Co-Authors: Prakash Kuppuswamy, Saeed Q Y Al-khalidi
    Abstract:

    This research study proposes hybrid encryption system using new public Key Algorithm and private Key Algorithm. A hybrid cryptosystem is one which combines the convenience of a public-Key cryptosystem with the efficiency of a symmetric-Key cryptosystem. Here, we propose a provably two way secured data encryption system, which addresses the concerns of user's privacy, authentication and accuracy. This system has two different encryption Algorithms which have been used both in the encryption and decryption sequence. One is public Key cryptography based on linear block cipher another one is private Key cryptography based on simple symmetric Algorithm. This cryptography Algorithm provides more security as well as authentication comparing to other existing hybrid Algorithm.

  • new innovation of arabic language encryption technique using new symmetric Key Algorithm
    2014
    Co-Authors: Prakash Kuppuswamy, Yahya Alqahtani
    Abstract:

    Security is the one of the biggest concern in different type of network communication as well as individual countries. Cryptography Algorithms become much more important in data transmission through unsecured channel. One third of the world using Arabic language, unfortunately, there is no cryptography Algorithm to encrypt/decrypt for the Arabic communication country. The main goal of this research is to introduce effective symmetric Key Algorithm on Arabic characters. In our research we have proposed a modular 37 and Arabic letters assigning to the integer value also numerals 0-9 also assigned as an integer number called as synthetic value. The procedure of encryption and decryption is simple and effective. We are selecting random integer and calculate inverse of the selected integer with modular 37. The symmetric Key distribution should be done in the secured channel for decrypting message. Here we are attempting simple symmetric Key Algorithm on Arabic language with ground-breaking sense.

  • improving security authentication of ieee 802 16 wimax with new public Key Algorithm
    2014
    Co-Authors: Prakash Kuppuswamy, Sikandhar Shah
    Abstract:

    WiMAXtechnology is a new trend in wireless communication. The IEEE Standard 802.16 WiMAX protocol provides wireless broadband access to homes, businesses and core telecommunication networks worldwide. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still exposes to various attacks in. This paper provides a mechanism for increasing the efficiency and hence improves the existing model of 802.16 protocols using new public Key Algorithm. We are attempting here new Algorithm based on block cipher (Nlbc) for the replacement of RSA Algorithm which is using in the IEEE Standard 802.16 WiMAX Technology.

Ajay Bhushan - One of the best experts on this subject based on the ideXlab platform.

  • cryptanalysis with a symmetric Key Algorithm tordes
    2013
    Co-Authors: Pawitar Dulari, Ajay Bhushan
    Abstract:

    In today's epoch, most of the means of secure data and code storage and distribution rely on using cryptographic Schemes, such as certificates or encryption Keys. This paper is devoted to the security and attack aspects of cryptographic techniques with new symmetric Key Algorithm TORDES. This Algorithm is proposed to achieve the different goals of security i.e., Availability, Confidentiality and Integrity. We will also discuss the security threats in this Algorithm.

  • component of symmetric Key Algorithm tordes with its functionality
    2012
    Co-Authors: Ajay Bhushan, Pawitar Dulari
    Abstract:

    In the absence of generally acknowledged metrics in the public area that could be used to compute and spell out cryptographic strength, a small operational group agreed to look at the possibility of developing an approach to cryptographic metrics The purpose of this paper is to report the results of the limited exploratory effort by above operational group that investigated the practicality of developing metrics for use in specifying the strength of cryptographic Algorithms. TORDES deals with a small sample of selected symmetric cipher block encryption Algorithms.

Pawitar Dulari - One of the best experts on this subject based on the ideXlab platform.

  • cryptanalysis with a symmetric Key Algorithm tordes
    2013
    Co-Authors: Pawitar Dulari, Ajay Bhushan
    Abstract:

    In today's epoch, most of the means of secure data and code storage and distribution rely on using cryptographic Schemes, such as certificates or encryption Keys. This paper is devoted to the security and attack aspects of cryptographic techniques with new symmetric Key Algorithm TORDES. This Algorithm is proposed to achieve the different goals of security i.e., Availability, Confidentiality and Integrity. We will also discuss the security threats in this Algorithm.

  • component of symmetric Key Algorithm tordes with its functionality
    2012
    Co-Authors: Ajay Bhushan, Pawitar Dulari
    Abstract:

    In the absence of generally acknowledged metrics in the public area that could be used to compute and spell out cryptographic strength, a small operational group agreed to look at the possibility of developing an approach to cryptographic metrics The purpose of this paper is to report the results of the limited exploratory effort by above operational group that investigated the practicality of developing metrics for use in specifying the strength of cryptographic Algorithms. TORDES deals with a small sample of selected symmetric cipher block encryption Algorithms.

Kijun Han - One of the best experts on this subject based on the ideXlab platform.

Joyshree Nath - One of the best experts on this subject based on the ideXlab platform.

  • a new symmetric Key cryptography Algorithm using extended msa method djsa symmetric Key Algorithm
    International Conference on Communication Systems and Network Technologies, 2011
    Co-Authors: Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta, Asoke Nath
    Abstract:

    In the present work the authors introduced a new symmetric Key cryptographic method for encryption as well as decryption of any file such as binary file, text file or any other file. Nath et. al. (1) developed an Algorithm called MSA for encryption and decryption of any file using a random Key square matrix containing 256 elements. The weak point of MSA Algorithm is that if someone applies the brute force method then he has to give a trial for factorial 256 to find the actual Key matrix. Now in the modern world this number of trial runs may not be impossible for the hacker. To get rid of this problem here the authors suggest a better Algorithm than MSA. In the present method the authors considered the size of the Key matrix to be 65536 and in each cell we store 2 characters pattern instead of 1 character unlike MSA method. If someone wants to give a brute force method to find our actual Key then one has to give a trial for factorial 65536 runs! Theoretically this is an intractable problem. Moreover the authors have also introduced multiple encryptions here to make the system more secured. This method will be suitable in any business house, government sectors, communication network, defense network system, sensor networks etc. In the present work the authors have introduced a square Key matrix of size 256 by 256 where in each cell there are all possible 2-lettered words (ASCII code 0-255). The total number of words possible is 65536. The Key matrix is then randomized using the method proposed by Nath et. al(1). The user has to enter some secret text-Key. The maximum length of the text Key should be 16 characters long. To calculate the randomization number and the number of encryption to be done is calculated from the text-Key using a method proposed by Nath et.al(1). The present method will be most suitable for encryption of a file whose size is less than or equal to 2MB. If the file size is very big then we suggest choosing small encryption number to speed up the system.

  • New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation and MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm
    2011 International Conference on Communication Systems and Network Technologies, 2011
    Co-Authors: Neeraj Khanna, Joel James, Joyshree Nath, Sayantan Chakraborty, Amlan Chakrabarti, ANINDYA NATH
    Abstract:

    In the present work the authors have introduced a new advanced symmetric Key cryptographic method called NJJSAA. The authors introduced new bit manipulation method for data encryption and decryption of any file. Nath et al already developed some symmetric Key methods where they have used some randomized Key matrix for encryption and decryption methods. In the present work the authors have used a bit manipulation method which include bit exchange, right shift and XOR operation on the incoming bits. To exchange bits the authors used a randomized Key matrix of size (16×16) using the method developed by Nath et al. The present method allows the multiple encryption and multiple decryption. To initiate the encryption process a user has to enter a text-Key which may be maximum of 16 characters long. From the text-Key the authors have calculated randomization number and the encryption number. The method used was developed by Nath et al. A slight change in the text-Key will change the randomization number and the encryption number quite a lot. Multiple encryption using bit exchange, bit right shift and XOR operations makes the system very secured. The present method is a block cipher method and it can be applied to encrypt data in sensor network or in mobile network. The advantage of the present method is that one can apply this method on top of any other standard Algorithm such as DES, AES or RSA. The method is suitable to encrypt any large or small file. There is a scope to further enhance the present method of encryption.

  • An integrated symmetric Key cryptography Algorithm using Generalised Modified Vernam Cipher method and DJSA method: DJMNA symmetric Key Algorithm
    2011 World Congress on Information and Communication Technologies, 2011
    Co-Authors: Megholova Mukherjee, Asoke Nath, Neha Choudhary, Joyshree Nath
    Abstract:

    In the present work the authors have introduced an integrated symmetric Key cryptographic method DJMNA which combine two independent methods (i) Modified Generalized Vernam Cipher (MGVC) method and (ii) DJSA method which is an extension of MSA method. The Generalized Vernam Cipher Algorithm extends text encryption to any type of data encryption. This is done by using ASCII code of all characters (0-255). This modified version of Generalized Vernam Cipher uses “feedback” effect and also reverses the file while encryption. This makes the encryption process very hard to decrypt by using any brute force method. It was found that the encrypted text has huge difference for similar plaintexts having minor difference even for the same text-Key. From this text Key two randomized matrices are generated. The elements of this matrix decides the order of application of DJSA and MGVC methods.