Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison

نویسندگان

  • Rajat S Goswami
  • Swarnendu K Chakraborty
  • Abhinandan Bhunia
  • Chandan T Bhunia
  • C. T. Bhunia
  • G. Mondal
  • S. Samaddar
  • P. Chakrabarti
  • B. Bhuyan
  • A. Chowdhuri
  • Swarnendu Kumar Chakraborty
  • Rajat Subhra Goswami
چکیده

Session to session key variation is the only approach for achieving perfect security as per Shannon [1-2]. This paper deals with time variant key technique Automatic Variable Key (AVK) introduced by Bhunia[3-5] and we tried to analyze the performance of different types of new AVK techniques. Refer ences C E Shannon, "Mathematical theory of communication", The Bell System Tech J, Vol. 27,1984, pp. 379-423, 623-656.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing Koyama Scheme Using Selective Encryption Technique in RSA-based Singular Cubic Curve with AVK

This paper analyzes application of Selective Encryption with Automatic Variable Key (AVK) for text based documents in Koyama Public Key Cryptosystem (PKC). In this paper, a new robust and simple PKC based singular cubic curve cryptosystem over the ring Zn, using selective encryption with Automatic Variable Key (AVK), is proposed. In the proposed algorithm, selected parts of text document are en...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

United Nations Educational Scientific and Cultural Organization and International Atomic Energy Agency THE ABDUS SALAM INTERNATIONAL CENTRE FOR THEORETICAL PHYSICS APPLICATION OF AVK AND SELECTIVE ENCRYPTION IN IMPROVING PERFORMANCE OF QUANTUM CRYPTOGRAPHY AND NETWORKS

The subject of quantum cryptography has emerged as an important area of research. Reported theoretical and practical investigations have conclusively established the reliable quantum key distribution (QKD) protocols with a higher level of security. For perfect security, the implementation of a time variant key is essential. The nature of cost and operation involved in quantum key distribution t...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Sparse approach for realizing AVK for Symmetric Key Encryption

Symmetric key cryptography has been a hot topic because of exchange of secure communication through various networks ligand Investigation of reversible XOR like function for symmetric key cryptography has been a big challenge. Moreover it is also desired that the reversible XOR function must be as efficient as traditional XOR. In the literature related to Automatic Variables Key, Fibonacci-Q ma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013