CFP last date
20 January 2025
Reseach Article

Comparative Study on Vernam Cipher stream and Rail ‎Fence Stream in IoT

by Adnan Adel Bitar, V. Sujatha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 31
Year of Publication: 2020
Authors: Adnan Adel Bitar, V. Sujatha
10.5120/ijca2020920366

Adnan Adel Bitar, V. Sujatha . Comparative Study on Vernam Cipher stream and Rail ‎Fence Stream in IoT. International Journal of Computer Applications. 176, 31 ( Jun 2020), 38-40. DOI=10.5120/ijca2020920366

@article{ 10.5120/ijca2020920366,
author = { Adnan Adel Bitar, V. Sujatha },
title = { Comparative Study on Vernam Cipher stream and Rail ‎Fence Stream in IoT },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2020 },
volume = { 176 },
number = { 31 },
month = { Jun },
year = { 2020 },
issn = { 0975-8887 },
pages = { 38-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number31/31404-2020920366/ },
doi = { 10.5120/ijca2020920366 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:44:00.101189+05:30
%A Adnan Adel Bitar
%A V. Sujatha
%T Comparative Study on Vernam Cipher stream and Rail ‎Fence Stream in IoT
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 31
%P 38-40
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Many encryption algorithms have been used to achieve the needed performance of ‎securing data. And each encryption algorithm has its pros and cons. Due to the ‎development of IoT in many areas and the continuous increase in its devices, securing ‎data being transmitted became nigh on impossible.

References
  1. Seagate.com: The digitization of the world from edge to core, 2018‎
  2. http://www.crypto-it.net/eng/simple/rail-fence-cipher.html
  3. Dar. Jawad Ahmad and Sharma. Sandeep, “Implementation of One Time Pad Cipher ‎with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data ‎security”, International Journal of Science and Research, vol 3 issue 11, 2014‎
  4. https://web.archive.org/web/20110518125721/http://www.simonsingh.net/The_Black_‎Chamber/railfence.html
  5. https://web.archive.org/web/20121010011445/https://www.nsa.gov/about/_files/cryptologic_heritage/publications/misc/tsec_kw26.pdf)‎
  6. Wang. Liyan, Li. Yonghua, Jia. Siqi, Gang. Jiatai,.” A stream cipher algorithm based on ‎composite chaotic dynamical systems”. Journal of Dalian University of ‎Technology, vol 52. 2012.‎
  7. Shannon. C.E, “Communication theory of secrecy systems”, Bell System Technical ‎Journal, vol 28, no.4, pp. 656-715,1949.
Index Terms

Computer Science
Information Sciences

Keywords

Security Vernam Rail-Fence encryption performance IoT