MAT-V: A strong cryptography algorithm for stream cipher techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 5
Abstract
To improve and increase greater security, efficiency, confidentiality for end user in stream cipher algorithms and also increases complexity for all types of attackers such as correlation attack and linear syndrome attack. MAT-V algorithm is asymmetric key cipher technique each character is encrypted with different private keys. So that increases complexity for attacker to identify original message sent by user. This algorithm provides confidentiality, authentication and data integrity and access control. Different keys are generated based on mathematical solutions of encryption keys and decryption keys. This algorithm reduces drawbacks of PKZIP, ORYX and SEAL drawbacks.
Authors and Affiliations
VANI . N , SRIDEVI MALIPATIL , CHETHANA . C
Comparative Study of Different Clustering Algorithms for Association Rule Mining
In data mining, association rule mining is an important research area in today’s scenario. Various association rule mining can find interesting associations and correlation relationship among a large set of data items[1]...
Comparative evaluation of Recursive Dimensional Cutting Packet Classification, DimCut, with Analysis
an infinitely expanding number of network appliances are utilising packet classifiers to fulfil Quality of Service, security, and traffic engineering tasks. Packet classification is an important role of firewalls and rou...
Genetic Programming and Artificial Neural Networks in a Chemical Process System
The main objective in this paper is to develop a mathematical model of the glucose to gluconic acid batch fermentation process utilizing novel techniques such as Genetic Programming and Artificial Neural Networks. Downlo...
Multi-Authentication for Cloud Security: A Framework
Cloud computing is a multi-tenant computational paradigm that offers an efficient, elastic and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware, net...
An Efficient Steganographic Scheme Using Skin Tone Detection and Discrete Wavelet Transformation
Steganography is a technique used for secret communication, in which secret information is embedded into a cover medium. The Secret information may be some text or image or even audio clip and the cover medium may be som...