Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison
نویسندگان
چکیده
Session to session key variation is the only approach for achieving perfect security as per Shannon [1-2]. This paper deals with time variant key technique Automatic Variable Key (AVK) introduced by Bhunia[3-5] and we tried to analyze the performance of different types of new AVK techniques. Refer ences C E Shannon, "Mathematical theory of communication", The Bell System Tech J, Vol. 27,1984, pp. 379-423, 623-656.
منابع مشابه
Enhancing Koyama Scheme Using Selective Encryption Technique in RSA-based Singular Cubic Curve with AVK
This paper analyzes application of Selective Encryption with Automatic Variable Key (AVK) for text based documents in Koyama Public Key Cryptosystem (PKC). In this paper, a new robust and simple PKC based singular cubic curve cryptosystem over the ring Zn, using selective encryption with Automatic Variable Key (AVK), is proposed. In the proposed algorithm, selected parts of text document are en...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملUnited Nations Educational Scientific and Cultural Organization and International Atomic Energy Agency THE ABDUS SALAM INTERNATIONAL CENTRE FOR THEORETICAL PHYSICS APPLICATION OF AVK AND SELECTIVE ENCRYPTION IN IMPROVING PERFORMANCE OF QUANTUM CRYPTOGRAPHY AND NETWORKS
The subject of quantum cryptography has emerged as an important area of research. Reported theoretical and practical investigations have conclusively established the reliable quantum key distribution (QKD) protocols with a higher level of security. For perfect security, the implementation of a time variant key is essential. The nature of cost and operation involved in quantum key distribution t...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملSparse approach for realizing AVK for Symmetric Key Encryption
Symmetric key cryptography has been a hot topic because of exchange of secure communication through various networks ligand Investigation of reversible XOR like function for symmetric key cryptography has been a big challenge. Moreover it is also desired that the reversible XOR function must be as efficient as traditional XOR. In the literature related to Automatic Variables Key, Fibonacci-Q ma...
متن کامل