Secured Private Key Handling using Transposition Cipher Technique

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Genetic Algorithms to Break a Simple Transposition Cipher

Genetic Algorithms are search algorithm. They use a metaphor where an optimization problem takes the place of an environment and feasible solutions are considered as individuals living in that environment. This paper focuses on using GAs to cryptanalyse a transposition cipher. A certain method is used to find the possible key length. It is shown that such algorithm could be used to discover the...

متن کامل

Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique

Protection of sensitive data is an important issue, precisely during transmission over internet. Efficient cryptographic methods are there to protect data but everything depends on the protection of the encryption key. Threshold cryptography enables the construction of reliable and robust key management system which can reconstruct the key even in the destroy of some shares and on the contrary ...

متن کامل

A Stream Cipher based Bit-Level Symmetric Key Cryptographic Technique using Chen Prime Number

In this paper, a stream cipher based symmetric key cryptographic technique based on Chen prime number has been proposed. The proposed technique is suitable for encryption and decryption of a large number of files of almost any type. A symmetric key is formed by the sender directly from the plain text using Chen prime number. Then a symmetric key value is derived from the symmetric key which is ...

متن کامل

Four key Secured Data Transfer Using Steganography and Cryptography

Steganography and cryptography are used to send the data in a confidential way. Steganography hides the existing message and cryptography will confuse the message. The transformation of plain text to cipher text is called as encryption. The transformation of cipher text to plain text is called decryption. Encryption and decryption are controlled by keys. Hashing, symmetric and asymmetric algori...

متن کامل

A Secured Key Generation Scheme Using Enhanced Entropy

This paper is an efficient and secure way to generate true random numbers. With an ever increasing repertoire of applications that incorporate Randomness, there arises a need to ensure that the Randomness is truly Random at all tenable circumstances. Through this paper we formulate a method to generate true random numbers by collecting entropy from devices such as mouse, keyboard and hard disk....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Trends in Computer Science and Engineering

سال: 2020

ISSN: 2278-3091

DOI: 10.30534/ijatcse/2020/1691.12020