Encryption, Decryption and Error Detection using Finite State Transducers and their Inverses
نویسندگان
چکیده
In this paper, we define the Inverse of a Finite State Transducer. The inverse and the corresponding Finite State Transducer are used for encryption and decryption of sequential data. The encryption process is designed for error detection capability during the decryption phase. Keywords-error detectiont capability;finite state transducer; Translational inverse;
منابع مشابه
On Post Decryption Error Pobability in Counter Mode Operation with Explicit Counter Transmittal
This paper analyzes the post decryption error probability in Counter mode operation in an error prone communications channel. A finite state stochastic model has been developed that quantifies the impact of bit errors in the ciphertext and cipher synchronization counter. Analytical results are used to compute post decryption error probabilities and are found to be in reasonable agreement with t...
متن کاملFPGA Can be Implemented Using Advanced Encryption Standard Algorithm
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
متن کاملEfficient Fault Detection Model Design “Hamming SEC-DAED-TAED- TETRA AED” Based AES Encryption and Decryption
The high level of security and the fast hardware and software implementation of the Advanced Standard Encryption (AES) have made it in the first choice for many critical applications. Advanced Encryption Standard (AES) is the self-determining hardware architecture for producing crypto mechanism. In a secure transmission system, Content Addressable Memory (CAM) based transmissions always provide...
متن کاملThe Huffman’s Method of Secured Data Encoding and Error Correction using Residue Number System (RNS)
Over the centuries, information security has become a major issue. Encryption and decryption of data has recently been widely investigated and developed because there is a demand for a stronger encryption and decryption which is very hard for intrusion. Cryptography plays major roles in fulfilment of these demands. Many of researchers have proposed a lot of encryption and decryption algorithms....
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کامل