[b]Secure Symmetric Key Algorithm [SSKA] For Information Exchange Using Modulo 67 [/b]
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 2
Abstract
The e-data usage is increasing day by day. Nowadays exchange of data over the internet is increased higher than before. Security is the main issue in communication over a network. Protection must be given against attackers. Solutions for network security comes with concepts like cryptography in which distribution of keys have been done. Cryptography plays a vital role in providing security. There are two types of cryptography mechanism: Symmetric and Asymmetric Key. Symmetric Key use single key for encryption and decryption whereas Asymmetric Key uses two keys one for encryption another for decryption. The most commonly used algorithm is Symmetric Key algorithms. The power or strength of these algorithms is based on the difficulty to break the original messages. In this paper, new modulo 67 Symmetric Key algorithm method is proposed Three keys are used in which one is a user entered key which is converted into ASCII and binary then first key is produced and second natural number is entered by user which is used to find the inverse of modulo 67. Third key is generated just like second key generation method. The proposed algorithm is used for Encryption and Decryption.
Authors and Affiliations
Mr. H. Mohamed Ashik
DETECTION OF COMPUTER VIRUSES USING WELM_ FMA_FABC
Computer viruses are big threat for our society .The expansion of various new viruses of varying forms make the prevention quite tuff. Here we proposed WELM_FMA_FABC to detect computer viruses. The proposed method...
Eigen Decomposition based Blind Source Separation
Blind Source Separation (BSS) is termed as the extraction of source signals from mixed data without or with little knowledge about the source signals. This work discusses different flavors of covariance based algo...
STABILIZATION OF SUB GRADE SOIL BY USING FOUNDRY SAND WASTE
Due to various construction development projects undertaken all over the world there is a substantial increase in the production of waste materials like concrete, fly ash, plastic, rice husk, foundry sand etc. whic...
E-maintenance : A Modern Maintenance Tool
In Earlier days maintenance function was not considered as one integral part of production process. It was considered as cost addition and extra function. But nowadays the importance of maintenance function has in...
Performance Evaluation of Reactive Routing Protocols in Manet Networks Using GPRS Based Data Traffic Applications
As it is well known to all that the network topology is the arrangement of various elements like links and nodes etc .So topology is nothing but the structure of network .If the nodes changes their location over t...