Real time cryptography with dual key encryption

被引:0
|
作者
Lakshmi, B. [1 ]
Prabakar, T. N. [2 ]
Kirubakaran, E. [3 ]
机构
[1] Nehru Mem Coll, Dept Comp Sci, Puthanampatti, India
[2] Natl Inst Technol, Tiruchirappalli, Tamil Nadu, India
[3] Bharath Heavy Elect Ltd, Tiruchirappalli, Tamil Nadu, India
关键词
Encryption; Decryption; Real Time Systems; Time Based Key; Brute Force attack; Cryptanalysis;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a method of encryption that enhances the security of vital data against Brute force attack. The method is based on dual key encryption in which two different keys encrypt the data simultaneously, one being the regular key and the other being the time of key entry. The encryption process uses conventional encryption methods with some modifications to increase the security but the decryption process is accomplished by checking both the validity of the key and the relative times the keys are entered into the system. This overcomes the fact that the brute force attack fully depends on the speed of the system used for cryptanalysis as the time interval between two successive key entries also consumes time. Also this paper proposes schemes for dynamically selecting the number of rounds each data set has to get encrypted and this increases the complexity of the cryptanalysis. The system requires the decryption has to be done on a single system and decryption via network requires some significant effort. The implementation is done in 'C' language and cryptanalysis is performed to check the level of protection.
引用
收藏
页码:221 / +
页数:2
相关论文
共 50 条
  • [1] MPEG video encryption in real-time using secret key cryptography
    Shi, CG
    Wang, SY
    Bhargava, B
    [J]. INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOL VI, PROCEEDINGS, 1999, : 2822 - 2828
  • [2] On Multiple Encryption for Public-Key Cryptography
    Soroceanu, Tudor
    Buchmann, Nicolas
    Margraf, Marian
    [J]. CRYPTOGRAPHY, 2023, 7 (04)
  • [3] Image encryption based on nonlinear encryption system and public-key cryptography
    Zhao, Tieyu
    Ran, Qiwen
    Chi, Yingying
    [J]. OPTICS COMMUNICATIONS, 2015, 338 : 64 - 72
  • [4] Secure non real time image encryption algorithm development using cryptography & Steganography
    Mukhedkar, Moresh
    Powar, Prajkta
    Gaikwad, Peter
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [5] Optical encryption based on ghost imaging and public key cryptography
    Kang Yi
    Zhang Leihong
    Zhang Dawei
    [J]. OPTICS AND LASERS IN ENGINEERING, 2018, 111 : 58 - 64
  • [6] Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm
    Geetha, R.
    Padmavathy, T.
    Thilagam, T.
    Lallithasree, A.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (01) : 21 - 36
  • [7] Image Encryption and Decryption in Public Key Cryptography based on MR
    Amalarethinam, D. I. George
    Geetha, J. Sai
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 133 - 138
  • [8] Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm
    R. Geetha
    T. Padmavathy
    T. Thilagam
    A. Lallithasree
    [J]. Wireless Personal Communications, 2020, 112 : 21 - 36
  • [9] Functional Encryption: A New Vision for Public-Key Cryptography
    Boneh, Dan
    Sahai, Amit
    Waters, Brent
    [J]. COMMUNICATIONS OF THE ACM, 2012, 55 (11) : 56 - 64
  • [10] Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography
    Syalim, Amril
    Nishide, Takashi
    Sakurai, Kouichi
    [J]. 2017 INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2017), 2017, : 105 - 111