CFP last date
20 January 2025
Reseach Article

An Axiomatic Approach for Secure Data Transmission

by Srishti Agarwal, Anurag Malik
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 9
Year of Publication: 2013
Authors: Srishti Agarwal, Anurag Malik
10.5120/11870-7664

Srishti Agarwal, Anurag Malik . An Axiomatic Approach for Secure Data Transmission. International Journal of Computer Applications. 69, 9 ( May 2013), 15-20. DOI=10.5120/11870-7664

@article{ 10.5120/11870-7664,
author = { Srishti Agarwal, Anurag Malik },
title = { An Axiomatic Approach for Secure Data Transmission },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 9 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 15-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number9/11870-7664/ },
doi = { 10.5120/11870-7664 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:29:47.755944+05:30
%A Srishti Agarwal
%A Anurag Malik
%T An Axiomatic Approach for Secure Data Transmission
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 9
%P 15-20
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is the strongest link in the chain of security since it plays an integral role in secure communication. Symmetric key cryptography is the oldest form of cryptology in which identical keys are used by the sender and receiver to share the confidential data. This research paper is about analyzing and designing of a symmetric key cryptographic technique which provides security at enhanced level and offer defense against non-traditional security threats. The algorithm "An Axiomatic Approach for Secure Data Transmission" is compared with the algorithm "Advanced Encryption Standards", analytical results are also shown to prove the better outcomes.

References
  1. Ayushi "A symmetric Key Cryptography" Published in International Journal of Computer Applications (0975-8887), Vol. 1, No. 15, pp 1-4
  2. H. Lee Kwang "Basic Encryption and Decryption"
  3. Himani Agrawal and Monisha Sharma "Implementation and analysis of various symmetric cryptosystems", Indian Journal of Science and Technology Vol. 3 No. 12 (Dec 2010) ISSN: 0974- 6846, pp. 1173-1176
  4. http://csrc. nist. gov/publications/fips/fips197/fips-197. pdf
  5. http://williamstallings. com/Crypto/Crypto4e. html
  6. http://www. garykessler. net/library/crypto. html
  7. http://www. go4expert. com/forums/showthread. php?t=19704
  8. http://www-jj. cs. tu-dortmund. de/secse/pages/research/motivation_en. shtml
  9. http://www. topbits. com/plaintext-and-ciphertext. html
  10. http://www. ukessays. co. uk/essays/engineering/background-and-research-motivation. php
  11. mbandukda. files. wordpress. com/2008/03/cryptosystems. doc
  12. www. cl. cam. ac. uk/~rja14/Papers/SE-05. pdf
Index Terms

Computer Science
Information Sciences

Keywords

Symmetric Key Cryptography Cipher text Block Cipher Encryption/Decryption Minimized CPU Utilization Increased Key Complexity Minimized Memory Utilization Advanced Encryption Standards