Symmetric Key Algorithm Using Vernam Cipher: VSA

被引:0
|
作者
Pawar, Bhagyashri K. [1 ]
Hatkar, S. S. [1 ]
机构
[1] SGGSIE&T, CSE Dept, Nanded, India
关键词
cryptography; symmetric key cryptography; stream cipher; Ex-or operation; vernam Cipher;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Now a days people are dependent on the internet so security of data becomes a major issue including integrity. Data security is a very important aspect in this digital world. Cryptography came into the picture to provide data security. In cryptography, cryptosystem means a suite of cryptographic algorithms expected to execute a specific security most commonly for achieving confidentiality. Basically a cryptosystem consists of three algorithms: one for key generation, another for encryption and another for decryption. There are a number of algorithms using different methods to achieve security measures for data and information. This Paper elaborates an efficient and effective symmetric cryptographic algorithm using time-variant keys
引用
收藏
页码:412 / 415
页数:4
相关论文
共 50 条
  • [21] Statistical Analysis and Security Evaluation of Chaotic RC5-CBC Symmetric Key Block Cipher Algorithm
    Abidi, Abdessalem
    Sghaier, Anissa
    Machhout, Mohsen
    Bakiri, Mohammed
    Guyeux, Christophe
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (10) : 533 - 538
  • [22] On a Vernam cipher scheme based on elliptic curve L-functions
    Omar, Sami
    Eid, Abdulla
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (01): : 151 - 174
  • [23] Using image as cipher key in AES
    Hosseinkhani, Razi
    Seyyed Javadi, Seyyed Hamid Haj
    International Journal of Computer Science Issues, 2012, 9 (2 2-2): : 538 - 544
  • [24] Multi-LSB and Modified Vernam Cipher to Enhance Document File Security
    Nababan, Erna Budhiarti
    Simbolon, Goklas Tomu
    Sitompul, Opim Salim
    Nababan, Erna Budhiarti (ernabrn@usu.ac.id), 1600, International Association of Engineers (47): : 1 - 8
  • [25] A symmetric image cipher using wave perturbations
    Wu, Yue
    Zhou, Yicong
    Agaian, Sos
    Noonan, Joseph P.
    SIGNAL PROCESSING, 2014, 102 : 122 - 131
  • [26] Email Authentication Using Symmetric and Asymmetric Key Algorithm Encryption
    Halim, Mohamad Azhar Abdul
    Wen, Chuah Chai
    Rahmi, Isredza
    Abdullah, Nurul Azma
    Rahman, Nurul Hidayah Ab.
    2ND INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2017 (ICAST'17), 2017, 1891
  • [27] Bit Level Symmetric Key Cryptography using Genetic Algorithm
    Sen, Abhishek
    Ghosh, Attri
    Nath, Asoke
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 193 - 199
  • [28] Key Schedule Algorithm using 3-Dimensional Hybrid Cubes for Block Cipher
    Mushtaq, Muhammad Faheem
    Jame, Sapiee
    Megat, Siti Radhiah B.
    Akram, Urooj
    Deris, Mustafa Mat
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (08) : 427 - 442
  • [29] Novel Algorithm in Symmetric Encryption (NASE) Based on Feistel Cipher
    Baker, Safiah I. Bani
    Al-Hamami, Alaa Hussein
    2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, : 191 - 196
  • [30] Generation of Key Matrix for Hill Cipher Encryption Using Classical Cipher
    Mani, K.
    Mahendran, R.
    2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT), 2017, : 51 - 54