Secured Private Key Handling using Transposition Cipher Technique
نویسندگان
چکیده
منابع مشابه
Using Genetic Algorithms to Break a Simple Transposition Cipher
Genetic Algorithms are search algorithm. They use a metaphor where an optimization problem takes the place of an environment and feasible solutions are considered as individuals living in that environment. This paper focuses on using GAs to cryptanalyse a transposition cipher. A certain method is used to find the possible key length. It is shown that such algorithm could be used to discover the...
متن کاملUltra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique
Protection of sensitive data is an important issue, precisely during transmission over internet. Efficient cryptographic methods are there to protect data but everything depends on the protection of the encryption key. Threshold cryptography enables the construction of reliable and robust key management system which can reconstruct the key even in the destroy of some shares and on the contrary ...
متن کاملA Stream Cipher based Bit-Level Symmetric Key Cryptographic Technique using Chen Prime Number
In this paper, a stream cipher based symmetric key cryptographic technique based on Chen prime number has been proposed. The proposed technique is suitable for encryption and decryption of a large number of files of almost any type. A symmetric key is formed by the sender directly from the plain text using Chen prime number. Then a symmetric key value is derived from the symmetric key which is ...
متن کاملFour key Secured Data Transfer Using Steganography and Cryptography
Steganography and cryptography are used to send the data in a confidential way. Steganography hides the existing message and cryptography will confuse the message. The transformation of plain text to cipher text is called as encryption. The transformation of cipher text to plain text is called decryption. Encryption and decryption are controlled by keys. Hashing, symmetric and asymmetric algori...
متن کاملA Secured Key Generation Scheme Using Enhanced Entropy
This paper is an efficient and secure way to generate true random numbers. With an ever increasing repertoire of applications that incorporate Randomness, there arises a need to ensure that the Randomness is truly Random at all tenable circumstances. Through this paper we formulate a method to generate true random numbers by collecting entropy from devices such as mouse, keyboard and hard disk....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Trends in Computer Science and Engineering
سال: 2020
ISSN: 2278-3091
DOI: 10.30534/ijatcse/2020/1691.12020