We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Comparative Study on Vernam Cipher stream and Rail ‎Fence Stream in IoT

by Adnan Adel Bitar, V. Sujatha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 31
Year of Publication: 2020
Authors: Adnan Adel Bitar, V. Sujatha
10.5120/ijca2020920366

Adnan Adel Bitar, V. Sujatha . Comparative Study on Vernam Cipher stream and Rail ‎Fence Stream in IoT. International Journal of Computer Applications. 176, 31 ( Jun 2020), 38-40. DOI=10.5120/ijca2020920366

@article{ 10.5120/ijca2020920366,
author = { Adnan Adel Bitar, V. Sujatha },
title = { Comparative Study on Vernam Cipher stream and Rail ‎Fence Stream in IoT },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2020 },
volume = { 176 },
number = { 31 },
month = { Jun },
year = { 2020 },
issn = { 0975-8887 },
pages = { 38-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number31/31404-2020920366/ },
doi = { 10.5120/ijca2020920366 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:44:00.101189+05:30
%A Adnan Adel Bitar
%A V. Sujatha
%T Comparative Study on Vernam Cipher stream and Rail ‎Fence Stream in IoT
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 31
%P 38-40
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Many encryption algorithms have been used to achieve the needed performance of ‎securing data. And each encryption algorithm has its pros and cons. Due to the ‎development of IoT in many areas and the continuous increase in its devices, securing ‎data being transmitted became nigh on impossible.

References
  1. Seagate.com: The digitization of the world from edge to core, 2018‎
  2. http://www.crypto-it.net/eng/simple/rail-fence-cipher.html
  3. Dar. Jawad Ahmad and Sharma. Sandeep, “Implementation of One Time Pad Cipher ‎with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data ‎security”, International Journal of Science and Research, vol 3 issue 11, 2014‎
  4. https://web.archive.org/web/20110518125721/http://www.simonsingh.net/The_Black_‎Chamber/railfence.html
  5. https://web.archive.org/web/20121010011445/https://www.nsa.gov/about/_files/cryptologic_heritage/publications/misc/tsec_kw26.pdf)‎
  6. Wang. Liyan, Li. Yonghua, Jia. Siqi, Gang. Jiatai,.” A stream cipher algorithm based on ‎composite chaotic dynamical systems”. Journal of Dalian University of ‎Technology, vol 52. 2012.‎
  7. Shannon. C.E, “Communication theory of secrecy systems”, Bell System Technical ‎Journal, vol 28, no.4, pp. 656-715,1949.
Index Terms

Computer Science
Information Sciences

Keywords

Security Vernam Rail-Fence encryption performance IoT