MAT-V: A strong cryptography algorithm for stream cipher techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 5
Abstract
To improve and increase greater security, efficiency, confidentiality for end user in stream cipher algorithms and also increases complexity for all types of attackers such as correlation attack and linear syndrome attack. MAT-V algorithm is asymmetric key cipher technique each character is encrypted with different private keys. So that increases complexity for attacker to identify original message sent by user. This algorithm provides confidentiality, authentication and data integrity and access control. Different keys are generated based on mathematical solutions of encryption keys and decryption keys. This algorithm reduces drawbacks of PKZIP, ORYX and SEAL drawbacks.
Authors and Affiliations
VANI . N , SRIDEVI MALIPATIL , CHETHANA . C
Implementation of Vehicle License Plate Recognition Using Canny Edge Detection
Vehicle number plate identification based on digital image processing is a vital area of research ongoing in present scenario. It offers various applications expanding through many fields. This technique may be used for...
Performance analysis of AODV &GPSR routing protocol in VANET
VANET (Vehicular Ad Hoc Network) is an emerging technology to achieve intelligent inter vehicle communications, it is the specialized derivation of pure multi hop ad hoc networking and are already going through industria...
Techniques of Software Fault Tolerance
Fault tolerance is the ability of a system to perform its function correctly even in the presence of internal faults. We should accept that, relying on software techniques for obtaining dependability means accepting some...
Identity-Based Localization Attacks in Wireless Networks
Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cry...
Secure Authentication Protocol to Detect Sybil Attacks in MANETs
Mobile ad-hoc networks (MANETs) are well known to be susceptible to various attacks, due to features such as lack of centralized control, dynamic topology, limited physical security and energy constrained operations. In...