CFP last date
20 December 2024
Reseach Article

An Exquisite Cryptographic Algorithm for Lesser Amount of Data

Published on May 2012 by Akhil Kaushik, Satvika, Manoj Barnela, Om Parkash
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 13
May 2012
Authors: Akhil Kaushik, Satvika, Manoj Barnela, Om Parkash
c8e797a9-17f0-4858-9c40-e6b4c5eeaf07

Akhil Kaushik, Satvika, Manoj Barnela, Om Parkash . An Exquisite Cryptographic Algorithm for Lesser Amount of Data. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 13 (May 2012), 1-5.

@article{
author = { Akhil Kaushik, Satvika, Manoj Barnela, Om Parkash },
title = { An Exquisite Cryptographic Algorithm for Lesser Amount of Data },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 13 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/rtmc/number13/6714-1113/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Akhil Kaushik
%A Satvika
%A Manoj Barnela
%A Om Parkash
%T An Exquisite Cryptographic Algorithm for Lesser Amount of Data
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 13
%P 1-5
%D 2012
%I International Journal of Computer Applications
Abstract

Once an application steps out of the bounds of a single-computer box, its external communication is immediately exposed to a multitude of outside observers with various intentions, good or bad. In order to protect sensitive data while these are en route, applications invoke different methods. In today's world, most of the means of secure data and code storage and distribution rely on using cryptographic schemes, such as certificates or encryption keys. Thus, cryptography mechanisms form a foundation upon which many important aspects of a solid security system are built. Cryptography is the science of writing in secret code and is an ancient art. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then; those new forms of cryptography came soon after the widespread development of computer communications. There are two basic types of cryptography: Symmetric Key and Asymmetric Key. Symmetric key algorithms are the quickest and most commonly used type of encryption. Here, a single key is used for both encryption and decryption. There are few well-known symmetric key algorithms i. e. DES, RC2, RC4, IDEA etc. This paper describes cryptography and its types and then proposes a new symmetric key algorithm X-S cryptosystem based on stream cipher. Algorithms for both encryption and decryption are provided here. The advantages of this new algorithm over the others are also explained.

References
  1. W. Stallings, Cryptography and Network Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc. , pp 23-50, 1999.
  2. S. R. Kimbleton & G. M. Schneider, "Computer communications networks: approaches, objectives and performance considerations", ibid. , pp. 129-173, 1975.
  3. L. Hill, "Cryptography in an algebraic alphabet", Am. Math. Monthly, 36, pp. 306-312, 1999.
  4. K. Zeng, C. H. Yang, D. Y. Wei & T. R. N. Rao, "Pseudorandom Bit Generators in Stream-Cipher Cryptography", IEEE Computer, pp 8-17, February 199. 1
  5. P. P Charles & P. L Shari, Security in Computing: 4th edition, Prentice-Hall, Inc. , pp 40-42, 2008.
  6. G. Brassard, "A note on the complexity of cryptography", IEEE Trans. , pp. 232-233, Oct 2000.
  7. S. Mathew & K. P. Jacob, "A New Fast Stream Cipher: MAJE4", Proceedings of IEEE, INDICON2005, pp 60-63, 2005.
  8. S. M. Matyas, "Digital signatures—an overview", Computer Networks, vol. 3, pp. 87-94, 1979.
  9. D. Davies, "Tutorial: the security of data in networks", IEEE Computer Society, 1981.
  10. "Data Encryption Standard", FIPS PUB 46, National Bureau of Standards, Washington, DC Jan. 1977.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Encryption Decryption X-s Cryptosystem Pretty Good Privacy Symmetric Key Algorithm.