We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Error Control Codes: A Novel Solution for Secret Key Generation and Key Refreshment Problem

by Arjun Puri, Sudesh Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 92 - Number 1
Year of Publication: 2014
Authors: Arjun Puri, Sudesh Kumar
10.5120/15970-4720

Arjun Puri, Sudesh Kumar . Error Control Codes: A Novel Solution for Secret Key Generation and Key Refreshment Problem. International Journal of Computer Applications. 92, 1 ( April 2014), 1-6. DOI=10.5120/15970-4720

@article{ 10.5120/15970-4720,
author = { Arjun Puri, Sudesh Kumar },
title = { Error Control Codes: A Novel Solution for Secret Key Generation and Key Refreshment Problem },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 92 },
number = { 1 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume92/number1/15970-4720/ },
doi = { 10.5120/15970-4720 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:13:07.166096+05:30
%A Arjun Puri
%A Sudesh Kumar
%T Error Control Codes: A Novel Solution for Secret Key Generation and Key Refreshment Problem
%J International Journal of Computer Applications
%@ 0975-8887
%V 92
%N 1
%P 1-6
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is the science of encrypting the information so that it is rendered unreadable for an intruder. Cryptographic techniques are of utmost importance in today's world as the information to be sent might be of invaluable importance to both the sender and the receiver. Various cryptographic techniques ensure that even if an intruder intercepts the sent information, he is not able to decipher it thus render ending it useless for the intruder. Cryptography can be grouped into two types, that is Symmetric key cryptography and Asymmetric key cryptography. Symmetric key cryptography uses the same key for encryption as well as decryption thus making it faster compared to Asymmetric Key cryptography which uses different keys for encryption and decryption. Generation of dynamic keys for Symmetric key cryptography is an interesting field and in this we have tapped this field so as to generate dynamic keys for symmetric key cryptography. In this work, we have devised an algorithm for generating dynamic keys for sending messages over a communication channel and also solving key refreshment problem.

References
  1. Zeenat Mahmood, J. L Rana, Prof. Ashish khare, "Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG)", International Journal of Computer Applications (0975 – 8887) Volume 50– No. 19, July 2012
  2. Zivic Natasa, "Iterative Method for Correction of Messages protected by Symmetric Cryptographic Check Values", International Conference on Information Networking, 2012.
  3. Lifang Wu, Xingsheng Liu, Songlong Yuan, Peng Xiso, "A Novel Key Generation Cryptosystem Based on Face Features", ICSP 2010 Proceedings.
  4. Rolf Blom, "An optimal class of symmetric key generation systems", Advances in Cryptology - EUROCRYPT '84, LNCS 209, pp. 335-338, 1985,Springer-Verlag Berlin Heidelberg 1985.
  5. Rupam Kumar Sharma , "Generation of Biometric Key for use in DES" , IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 1, November 2012.
  6. I. Diop; S . M Farssi; O. Khouma; H. B Diouf; K . Tall; K . Sylla, "New Steganographic scheme based of Reed-Solomon codes", International Journal of Distributed and Parallel Systems (IJDPS) Vol. 3, No. 2, March 2012.
  7. Aanchal Aggarwal, Sunita Sangwan, Simerpreet kaur , "Enhancing Robustness of EC Cryptic Data using Forward Error Correction" , International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 1, July 2012.
  8. Yahya S. Khiabani, Shuangqing Wei , "Design and Analysis of an ARQ Based Symmetric Key Generation Algorithm" , 2011 military operation conference- track 3- cyber security and network operations.
  9. F. Ayoub and K. Singh, "Cryptographic techniques and network security", IEEE Proceedings, Vol. 131, Pt. F, No. 7, DECEMBER 1984.
  10. S. Kalaiselvi , Prof. S. Jabeen Begum , "A secure group communication using non-interactive key computation in multiparty key agreement" , Proceedings of the 2008 International Conference on Computing , Communication and Networking (ICCCN2008).
Index Terms

Computer Science
Information Sciences

Keywords

RS codes (Reed Solomon codes) ARQ (Automatic Repeat Request) DES (Data Encryption Standard).