Symmetric Key Algorithm Using Vernam Cipher: VSA

被引:0
|
作者
Pawar, Bhagyashri K. [1 ]
Hatkar, S. S. [1 ]
机构
[1] SGGSIE&T, CSE Dept, Nanded, India
关键词
cryptography; symmetric key cryptography; stream cipher; Ex-or operation; vernam Cipher;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Now a days people are dependent on the internet so security of data becomes a major issue including integrity. Data security is a very important aspect in this digital world. Cryptography came into the picture to provide data security. In cryptography, cryptosystem means a suite of cryptographic algorithms expected to execute a specific security most commonly for achieving confidentiality. Basically a cryptosystem consists of three algorithms: one for key generation, another for encryption and another for decryption. There are a number of algorithms using different methods to achieve security measures for data and information. This Paper elaborates an efficient and effective symmetric cryptographic algorithm using time-variant keys
引用
收藏
页码:412 / 415
页数:4
相关论文
共 50 条
  • [1] DNA Vernam Cipher
    Tornea, O.
    Borda, M. E.
    Pileczki, V.
    Malutan, R.
    2011 E-HEALTH AND BIOENGINEERING CONFERENCE (EHB), 2011,
  • [2] Quantum Vernam cipher
    Leung, DW
    QUANTUM INFORMATION & COMPUTATION, 2002, 2 (01) : 14 - 34
  • [3] Modified OTP Based Vernam Cipher Algorithm using Multilevel Encryption Method
    Brosas, Deborah G.
    Sison, Ariel M.
    Medina, Ruji P.
    PROCEEDINGS OF THE 2019 IEEE EURASIA CONFERENCE ON IOT, COMMUNICATION AND ENGINEERING (ECICE), 2019, : 201 - 204
  • [4] TWO-DIMENSIONAL (2D) CELLULAR AUTOMATA FOR THE VERNAM CIPHER ALGORITHM IN SECRET KEY CRYPTOGRAPHY
    Constantinescu, Nicolae
    Boldea, Costin
    ANNALS OF DAAAM FOR 2009 & PROCEEDINGS OF THE 20TH INTERNATIONAL DAAAM SYMPOSIUM, 2009, 20 : 881 - 882
  • [5] Design and analysis of key scheduling algorithm for symmetric cipher security
    Tiwari V.
    Kameswari U.S.
    Singh A.
    Saxena A.
    International Journal of Information Technology, 2024, 16 (6) : 3991 - 3997
  • [6] Complex key generation with secured seed exchange for Vernam cipher in security applications
    Manjunatha, Vijayalaxmi
    Rao, Arjun
    Khan, Airani
    MATERIALS TODAY-PROCEEDINGS, 2021, 35 : 497 - 500
  • [7] Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm
    Rachmawati, D.
    Budiman, M. A.
    Aulya, L.
    10TH INTERNATIONAL CONFERENCE NUMERICAL ANALYSIS IN ENGINEERING, 2018, 308
  • [8] Novel Block Cipher: Surrounding Elements Technique using Symmetric Key
    Merzah, Baler M.
    PROCEEDING OF 2021 2ND INFORMATION TECHNOLOGY TO ENHANCE E-LEARNING AND OTHER APPLICATION (IT-ELA 2021), 2021, : 142 - 147
  • [9] Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement
    Nurdiyanto, Heri
    Rahim, Robbi
    Wulan, Nur
    INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICONICT), 2017, 930
  • [10] The Vernam Cipher Is Robust to Small Deviations from Randomness
    Ryabko, B. Ya
    PROBLEMS OF INFORMATION TRANSMISSION, 2015, 51 (01) : 82 - 86