MAT-V: A strong cryptography algorithm for stream cipher techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 5
Abstract
To improve and increase greater security, efficiency, confidentiality for end user in stream cipher algorithms and also increases complexity for all types of attackers such as correlation attack and linear syndrome attack. MAT-V algorithm is asymmetric key cipher technique each character is encrypted with different private keys. So that increases complexity for attacker to identify original message sent by user. This algorithm provides confidentiality, authentication and data integrity and access control. Different keys are generated based on mathematical solutions of encryption keys and decryption keys. This algorithm reduces drawbacks of PKZIP, ORYX and SEAL drawbacks.
Authors and Affiliations
VANI . N , SRIDEVI MALIPATIL , CHETHANA . C
Identity-Based Localization Attacks in Wireless Networks
Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cry...
A Review on Tissue Segmentation and Feature Extraction of MRI Brain images
Magnetic resonance imaging (MRI) is an important diagnostic imaging technique for the early detection of brain cancer. Brain cancer is one of the most dangerous diseases occurring commonly among human beings. The chances...
A Survey on Administrative Policies in Rule- Based Access Control
Administrative controls contains the official written policies, rules, events and standards. It form the outline for running the organization and handling people. The Rule-Based access control defines detailed circumstan...
Power-Time Efficient Algorithm for Computing Reconfigurable FFT in Wireless Sensor Network
Wireless sensor network have several constraints, such as a short transmission range, poor processing capabilities, limited available power and slow execution time. The design of algorithms for fast processing of informa...
A Comparative Study of Various Network Simulation Tools
In the area of network research, establishing a network in a real time scenario is very difficult. A single test bed takes a large amount of time and cost. Thus a network simulator tool helps the network developer to che...