Symmetric Key Encryption With Many Secret Keys
Vijaya Kumar Sudeva
DOI: http://dx.doi.org/10.15439/2017R48
Citation: Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering, Vijender Kumar Solanki, Vijay Bhasker Semwal, Rubén González Crespo, Vishwanath Bijalwan (eds). ACSIS, Vol. 10, pages 335–339 (2017)
Abstract. One of the essential practices in the field of secured communication between two people is Cryptography. It confirms features like availability, authenticity, integrity and confidentiality of information. Also it enhances the mechanism of data security. For the purpose of encryption and decryption, in cryptography we have symmetric and asymmetric cryptography. Out of these, symmetric is the simplest and used widely due to its speed and feasibility in decrypting bulk messages, and requirement of limited computer resources. Symmetric key technique uses one secret key for cryptography, which opens the door for different kinds of security attacks. Through this paper I would like to introduce a Novel Symmetric key encryption and decryption using multiple secret keys. Here in this approach I am using different secret keys to encrypt different original texts.
References
- S. William, Cryptography and Network Security: Principles and practice 2nd edition, Prentice-Hall, Inc., 1999 pp 23-50.
- Aamer Nadeem, Dr M. Younus Javed, “A Performance Comparison of Data Encryption Algorithms”, First International Conference on IEEE Information and Communication Technologies (ICICT), Vol 1, Issue 6, 27-28 Aug. 2005, pp 84-89.
- S. Soni, H. Agrawal, M. Sharma, “Analysis and comparison between AES and DES Cryptographic Algorithm”, International Journal of Engineering and Innovative Technology, Vol 2, Issue 6, December 2012, pp.362-365.
- E.Surya and C. Diviya, “A Survey on Symmetric Key Encryption Algorithm s”, International Journal of Computer Science & Communication Networks,Vol 2(4), 475-477.
- Prakash Kuppuswamy, Dr.C.Chandrasekar, “Enrichment Of Security Through Cryptographic Public Key Science Algorithm Based On Block Cipher” Indian Journal of Computer and Engineering (IJCSE), Vol. 2 No. 3 Jun - Jul.2011.
- Steve Burnett & Stephen Paine RSA Security's Official Guide to Cryptography, Tata McGrawHill.
- Behrouz A. Forouzan,Cryptography & Network Security,Tata McGraw Hill..
- http://williamstallings.com/Crypto3e.html.
- http://www.cacr.math.uwaterloo.ca/hac