Logo PTI
Polish Information Processing Society
Logo RICE

Annals of Computer Science and Information Systems, Volume 10

Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering

Symmetric Key Encryption With Many Secret Keys

DOI: http://dx.doi.org/10.15439/2017R48

Citation: Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering, Vijender Kumar Solanki, Vijay Bhasker Semwal, Rubén González Crespo, Vishwanath Bijalwan (eds). ACSIS, Vol. 10, pages 335339 ()

Full text

Abstract. One of the essential practices in the field of secured communication between two people is Cryptography. It confirms features like availability, authenticity, integrity and confidentiality of information. Also it enhances the mechanism of data security. For the purpose of encryption and decryption, in cryptography we have symmetric and asymmetric cryptography. Out of these, symmetric is the simplest and used widely due to its speed and feasibility in decrypting bulk messages, and requirement of limited computer resources. Symmetric key technique uses one secret key for cryptography, which opens the door for different kinds of security attacks. Through this paper I would like to introduce a Novel Symmetric key encryption and decryption using multiple secret keys. Here in this approach I am using different secret keys to encrypt different original texts.

References

  1. S. William, Cryptography and Network Security: Principles and practice 2nd edition, Prentice-Hall, Inc., 1999 pp 23-50.
  2. Aamer Nadeem, Dr M. Younus Javed, “A Performance Comparison of Data Encryption Algorithms”, First International Conference on IEEE Information and Communication Technologies (ICICT), Vol 1, Issue 6, 27-28 Aug. 2005, pp 84-89.
  3. S. Soni, H. Agrawal, M. Sharma, “Analysis and comparison between AES and DES Cryptographic Algorithm”, International Journal of Engineering and Innovative Technology, Vol 2, Issue 6, December 2012, pp.362-365.
  4. E.Surya and C. Diviya, “A Survey on Symmetric Key Encryption Algorithm s”, International Journal of Computer Science & Communication Networks,Vol 2(4), 475-477.
  5. Prakash Kuppuswamy, Dr.C.Chandrasekar, “Enrichment Of Security Through Cryptographic Public Key Science Algorithm Based On Block Cipher” Indian Journal of Computer and Engineering (IJCSE), Vol. 2 No. 3 Jun - Jul.2011.
  6. Steve Burnett & Stephen Paine RSA Security's Official Guide to Cryptography, Tata McGrawHill.
  7. Behrouz A. Forouzan,Cryptography & Network Security,Tata McGraw Hill..
  8. http://williamstallings.com/Crypto3e.html.
  9. http://www.cacr.math.uwaterloo.ca/hac