Proposing A Ciphering Protocol
نویسندگان
چکیده
This paper describes a novel bit level stream cipher based symmetric key cryptographic technique. At first, sender and receiver agree upon a symmetric key. Then the symmetric key is formed using Greatest Common Divisor (G.C.D) of sum of even or odd bit positional weight even or odd number and a symmetric key value is derived from the symmetric by the sender. The symmetric key value is XORed with the ASCII value of the plain text character to get the cipher text character. This is repeated for the entire plain text file. The symmetric key and the entire cipher text file is sent by the sender to the receiver. From the symmetric key, the receiver calculates the symmetric key value. The symmetric key value is XORed with the cipher text character to get back the plain text character. When this process is repeated for every cipher text character, then entire plain text file is formed by the decryption process. This technique has several advantages like formation of symmetric key dynamically, more emphasis on symmetric key value rather than the symmetric key, security and equal applicability for encryption and decryption of a large number of files of almost any type or extension.
منابع مشابه
Definition of Master Key between PANA Client and Enforcement Point
This document defines a master key used between a client of the Protocol for carrying Authentication for Network Access (PANA) and an enforcement point, for bootstrapping lower-layer ciphering. The master key is derived from the Master Session Key of the Extensible Authentication Protocol as a result of successful PANA authentication. The master key guarantees cryptographic independence among e...
متن کاملInternet Engineering Task Force (ietf) Definition of Master Key between Pana Client and Enforcement Point
This document defines a master key used between a client of the Protocol for carrying Authentication for Network Access (PANA) and an enforcement point, for bootstrapping lower-layer ciphering. The master key is derived from the Master Session Key of the Extensible Authentication Protocol as a result of successful PANA authentication. The master key guarantees cryptographic independence among e...
متن کاملConfidentiality in the UMTS Radio Access Network Simulation approach under OPNET
The Universal Mobile Telecommunications System (UMTS) offers a panoply of 3G services. In addition to delivery of images, graphics and video communications, UMTS is used for such applications as banking and e-commerce and hence security is a critical concern. In the present paper, we are interested in the confidentiality feature in the UMTS Network Access. Ciphering when applied is performed in...
متن کاملOn Cooperatively Distributed Ciphering and Hashing
In this paper we rst bridge some problems of formal language theory to those of cryptography. In doing so, new problems in both elds are proposed. Motivated by the CD grammar systems [1], we then describe a general cooperatively distributed ciphering system and hashing system. These CD ciphering and hashing systems could be much more powerful than conventional ones if they are properly designed.
متن کاملA Stream Ciphering Approach Based on the Wire-Tap Channel Coding
8th Central European Conference on Cryptography 2008 1 Let’s call ECC-box a coponent which encodes the plaintext in order to provide correction of the random errors. Note that in the proposing stream cipher ECC-box encodes the plaintext so that it can be recovered correctly after corruption by the errors introduced in the ciphertext deliberately. Block scheme of the novel stream cipher family i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1605.02954 شماره
صفحات -
تاریخ انتشار 2016