TITLE

Keyless User Defined Optimal Security Encryption

AUTHOR(S)
Kaushik, Akhil; Satvika; Barnela, Manoj; Kumar, Anant
PUB. DATE
April 2012
SOURCE
International Journal of Computer & Electrical Engineering;Apr2012, Vol. 4 Issue 2, p99
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Cryptography and encryptions, these terms are now-a-days have an unseen impact in the emerging field of network and its security. As security of data on any kind of system has became the first priority for the organization, the methods which are used to ensure security not only need to be strong and efficient, but should also be easy to execute and implemented. With progress in technology, encryption came up with a big boom, taken as a weapon of ultimate security. It is an earliest art and it is defined as the science of writing in secret code. Basically, the cryptography algorithms are categorized into two types on the basis of key management, which are key-oriented and keyless encryption algorithms. The prime goal leading the design of an encryption algorithm must provide security against unauthorized attacks. Key-oriented algorithms are very efficient but they were very bulky to manage as key handling must be done. Due to the great overhead, keyless algorithms seem an attractive option. But what about security by keyless, here is the solution- KUDOS encryption, which is a keyless security algorithm to provide ultimate security at the one level above of key-oriented.
ACCESSION #
75499158

 

Related Articles

  • Secret Key Encryption.  // Network Dictionary;2007, p428 

    A definition of the term "Secret Key Encryption" is presented. Also known as Symmetric key encryption, it refers to an encryption based on a secret that is shared by two communicating parties. In the process of secret key encryption, only a sole key, the one described in the secret key...

  • Twofish.  // Network Dictionary;2007, p500 

    An encyclopedia entry for "Twofish" is presented. It refers to encryption algorithm based on an earlier algorithm, Blowfish, developed to replace the DES algorithm. It was a finalist to the NIST Advanced Encryption Standard (AES) algorithm.

  • A code named quantum.  // Engineer (00137758);3/19/2004, Vol. 293 Issue 7647, p7 

    Swiss company Id Quantique has launched the world's first commercial system to use quantum cryptography. The system allows a cryptographic key, a mathematical value used in an algorithm to encrypt or decrypt data, to be exchanged between two computers via a standard fiber-optics cable over...

  • A Novel Approach Share Key Refreshing for Long Term Protection in Distributed Cryptography by Proactive Security. Retoliya, Rajkumari; Tripathi, Anshu // International Journal of Computer Science Engineering & Technolo;Jul2011, Vol. 1 Issue 6, p290 

    Security is an important issue for networks, especially for those security-sensitive applications. In the entire environment of security, it is necessary to ensure privacy. This Paper provides share key refreshing technique for maintaining the security of the system, even when some nodes are in...

  • SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES. Atanasiu, Adrian; Savu, Laura // Journal of Information Systems & Operations Management;May2012, Vol. 6 Issue 1, p19 

    This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the...

  • Improvement of the Round Key Generation of AES. Junshe Wang; Han Xu; Mingqiu Yao // International Journal of Communications, Network & System Scienc;Dec2012, Vol. 5 Issue 12, p850 

    The key generation algorithm of AES was introduced, the weaknesses of the key generation design of AES were investigated. According to the key demand put forward a kind of new design idea, and this designing strategy was developed, which can be used to improve the key generation algorithm of...

  • Steganalysis of LSB matching for Images with High Noise. Qinglong Tian; Ronghui Wu; Zhihua Xia; Zhili Zhou; Yan Jiang // International Journal of Digital Content Technology & its Applic;Dec2011, Vol. 5 Issue 12, p204 

    This paper proposed a new steganalysis method against least significant bit (LSB) matching for images with high noise component which is considered more difficult for steganalysis than images with low noise component. First we calculate the sum of curvature of images histogram as discriminative...

  • Information Security Technique in Frequency Domain. Abbas, Thekra; Zou Beiji; Abdullah, Maan Younus // International Journal of Digital Content Technology & its Applic;Dec2011, Vol. 5 Issue 12, p279 

    There have been many hidden communication techniques proposed in the last few years. The focus of this development was given to steganography to build such techniques. This paper presents a novel technique for Image steganography based on a frequency domain, where DCT is used to transform...

  • New Data Encryption Standard Algorithm. Anchugam, K.; Tamilselvi, M. // International Journal of Computer Science & Network Security;Apr2013, Vol. 13 Issue 4, p106 

    A goal is the design of any encryption algorithm must be security against unauthorized attacks. Within the last decade, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has a significant...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics