A Cryptosystem Design with Recursive Key Generation Techniques
详细信息    查看全文
文摘
Communication is a basic process of exchanging information. It involves sender, receiver and the channel. Information security is a very important aspect now a day. The introduction of internet and distributed system made the information security issue more challenging and complex. Cryptography plays a crucial role in providing security to data transmitted over the internetwork. Encryption is the most widely used technique used to scramble the data that is being transmitted over the network from sender to a receiver. The encryption algorithms are available practically and provide the security for user data and information.This paper presents an advanced encryption technique which combines the features of substitution and transposition. Five different key values being used in this algorithms and each key value is used to substitute the corresponding plaintext characters in association with addition operation. Each key value is twice as that of the previous one. The basic key value is a fixed one defined by the user. The transposition technique is employed by left shifting each bit of the data. The shifted data is complemented to alter the each bit of the cipher text that is being generated. The effort of the algorithm is to make the cryptanalysis difficult and to make the algorithm stronger.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700