MAT-V: A strong cryptography algorithm for stream cipher techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 5
Abstract
To improve and increase greater security, efficiency, confidentiality for end user in stream cipher algorithms and also increases complexity for all types of attackers such as correlation attack and linear syndrome attack. MAT-V algorithm is asymmetric key cipher technique each character is encrypted with different private keys. So that increases complexity for attacker to identify original message sent by user. This algorithm provides confidentiality, authentication and data integrity and access control. Different keys are generated based on mathematical solutions of encryption keys and decryption keys. This algorithm reduces drawbacks of PKZIP, ORYX and SEAL drawbacks.
Authors and Affiliations
VANI . N , SRIDEVI MALIPATIL , CHETHANA . C
Operations on Signed Numbers
Signed integers are normally represented using 2’s complement representation. Addition and subtraction of signed numbers is done similar to that of unsigned numbers. However carry (or borrow) is simply ignored. Unlike un...
A Comparative Study of Various Fault Localization Methodologies
Fault in terms of Software Engineering is referred to as a bug, an error or a problem which causes a program to crash or generate invalid results. The problem is caused by either incorrect logic or insufficient logic. Fa...
A Novel Approach to Recognize the off-line Handwritten Numerals using MLP and SVM Classifiers
This paper presents a new approach to off-line handwritten numeral recognition. Recognition of handwritten numerals has been one of the most challenging task in pattern recognition. Recognition of handwritten numerals po...
Encryption/decryption tool with cryptanalysis
The dissertation titled” Encryption/Decryption Tool with Cryptanalysis” is based on the concept of cryptographic system. We have implemented a set of encryption/decryption methods which include Hill Cipher, Caesar Cipher...
Analysis of Fuzzy Fault Tree using Intuitionstic Fuzzy Numbers
In generally fuzzy seats are used to analyses the system reliability. In present paper we have presented a new approach to evaluate the reliability of fuzzy fault tree using Intuitionstic Fuzzy Numbers. In application of...