The CRYPSTER: A Private Key Crypto System

被引:0
|
作者
Datta, Avishek [1 ]
Chakraborty, Rajdeep [1 ]
Mandal, J. K. [2 ]
机构
[1] Netaji Subhash Engn Coll, Dept Comp Sci & Engn, Kolkata 700152, WB, India
[2] Univ Kalyani, Dept Comp Sci & Engn, Kalyani, W Bengal, India
关键词
Cryptography; Symmetric Cipher Cryptosystem; Recursive; Parity; CRYPSTER; Modified Recursive Parity Technique; XOR Changes;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security Solutions can never be completely and permanently developed. It may be true that One Time Pad might be one of the most complete Cryptosystems ever designed. That being said, it's not always that One Time Pad can be used. There are many applications where a lightweight but powerful Cryptosystem is required. This is where CRYPSTER comes in. The CRYPSTER is a modification on the platform of Recursive Paired Parity Technique (RPPT). This is a very lightweight but efficient cryptosystem which would provide a hard challenge even against Brute Force Attacks.
引用
收藏
页码:6 / 10
页数:5
相关论文
共 50 条
  • [1] Design and implementation of a private and public key crypto processor and its application to a security system
    Kim, H
    Lee, S
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) : 214 - 224
  • [2] A NOVEL CRYPTO SYSTEM WITH KEY ENTRENCHED CIPHER
    Kiran, S.
    Reddy, R. Pradeep Kumar
    Subramanyan, N.
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [3] And, crypto is the key ...
    不详
    COMPUTERS & SECURITY, 2001, 20 (05) : 349 - 351
  • [4] Physicians Medicament Linear Public Key Crypto System
    Thirumalai, Chandrasegar
    Senthilkumar, M.
    Vaishnavi, B.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1936 - 1939
  • [5] Model of a Distributed Storage System for Crypto Wallet Private Keys
    Salikhov, M. R.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2024, 58 (08) : 1289 - 1296
  • [6] Crypto key management
    Neumann, PG
    COMMUNICATIONS OF THE ACM, 1997, 40 (08) : 136 - 136
  • [7] Crypto backup and key escrow
    Maher, DP
    COMMUNICATIONS OF THE ACM, 1996, 39 (03) : 48 - 53
  • [8] Seroepidemiology - The key to crypto surveillance
    Griffiths, JK
    Morris, RD
    JOURNAL AMERICAN WATER WORKS ASSOCIATION, 1998, 90 (03): : 8 - 8
  • [9] SECURED CRYPTO-BIOMETRIC SYSTEM BASED ON SESSION KEY NAVIGATION
    Mekala, T.
    Natarajan, M.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND SYSTEMS (ICCCS'14), 2014, : 151 - 155
  • [10] A SECURE AND ROBUST CRYPTO SYSTEM BASED ON UNIQUE DYNAMIC KEY GENERATION SCHEME
    Swaminathan, S.
    Karthick, A.
    Suganya, S.
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,