Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG)
نویسندگان
چکیده
منابع مشابه
A Unique Approach to Multimedia Based Dynamic Symmetric Key Cryptography
In the past decades, Most of the cryptography and steganography based techniques emphasized on securing text or images only. They made use of traditional approaches like transpositions or substitutions for text security and image transformation techniques for image security. None of them completely ensures the safety of data from bruit-force methods, applied by spy-bots. To provide more securit...
متن کاملDynamic Key Cryptography and Applications
In modern security models, cryptography plays a fundamental role in protecting data integrity and confidentiality in information systems. However, cryptography itself is subject to cryptanalysis attacks. To reduce the cryptanalysis attack risk, a dynamic key theory is presented and analyzed in this paper. Because these dynamic keys are one-time used symmetric cryptographic keys, they can signif...
متن کاملCellular Programming and Symmetric Key Cryptography Systems
The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process of encryption highly depends on a quality of used random numbers. One dimensional, nonuniform CAs is considered as a generator of pseudorandom number sequences (PNSs). The quality of PNSs highly depends on a set of applied CA r...
متن کاملOn Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using symmetric-key cryptography for cost reasons. The consequence is that common daily used security protocols such as Bluetooth pairing are insecure in the sense that an adversary can easily extract the main private key from the proto...
متن کاملSecrecy Group Creation with Symmetric-Key Cryptography
We lift Cardelli, Ghelli and Gordon’s secrecy group creation operator [1] to a relative of the spicalculus that supports symmetric key cryptography, and show a natural extension of the associated type system. We then formulate a notion of secrecy preservation in the presence of cryptography, and prove that well-typed processes in the extended type system preserve secrecy of declared secrets, ev...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2012
ISSN: 0975-8887
DOI: 10.5120/7908-0973