Proposing A Ciphering Protocol

نویسندگان

  • Sarbajit Manna
  • Saurabh Dutta
چکیده

This paper describes a novel bit level stream cipher based symmetric key cryptographic technique. At first, sender and receiver agree upon a symmetric key. Then the symmetric key is formed using Greatest Common Divisor (G.C.D) of sum of even or odd bit positional weight even or odd number and a symmetric key value is derived from the symmetric by the sender. The symmetric key value is XORed with the ASCII value of the plain text character to get the cipher text character. This is repeated for the entire plain text file. The symmetric key and the entire cipher text file is sent by the sender to the receiver. From the symmetric key, the receiver calculates the symmetric key value. The symmetric key value is XORed with the cipher text character to get back the plain text character. When this process is repeated for every cipher text character, then entire plain text file is formed by the decryption process. This technique has several advantages like formation of symmetric key dynamically, more emphasis on symmetric key value rather than the symmetric key, security and equal applicability for encryption and decryption of a large number of files of almost any type or extension.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Definition of Master Key between PANA Client and Enforcement Point

This document defines a master key used between a client of the Protocol for carrying Authentication for Network Access (PANA) and an enforcement point, for bootstrapping lower-layer ciphering. The master key is derived from the Master Session Key of the Extensible Authentication Protocol as a result of successful PANA authentication. The master key guarantees cryptographic independence among e...

متن کامل

Internet Engineering Task Force (ietf) Definition of Master Key between Pana Client and Enforcement Point

This document defines a master key used between a client of the Protocol for carrying Authentication for Network Access (PANA) and an enforcement point, for bootstrapping lower-layer ciphering. The master key is derived from the Master Session Key of the Extensible Authentication Protocol as a result of successful PANA authentication. The master key guarantees cryptographic independence among e...

متن کامل

Confidentiality in the UMTS Radio Access Network Simulation approach under OPNET

The Universal Mobile Telecommunications System (UMTS) offers a panoply of 3G services. In addition to delivery of images, graphics and video communications, UMTS is used for such applications as banking and e-commerce and hence security is a critical concern. In the present paper, we are interested in the confidentiality feature in the UMTS Network Access. Ciphering when applied is performed in...

متن کامل

On Cooperatively Distributed Ciphering and Hashing

In this paper we rst bridge some problems of formal language theory to those of cryptography. In doing so, new problems in both elds are proposed. Motivated by the CD grammar systems [1], we then describe a general cooperatively distributed ciphering system and hashing system. These CD ciphering and hashing systems could be much more powerful than conventional ones if they are properly designed.

متن کامل

A Stream Ciphering Approach Based on the Wire-Tap Channel Coding

8th Central European Conference on Cryptography 2008 1 Let’s call ECC-box a coponent which encodes the plaintext in order to provide correction of the random errors. Note that in the proposing stream cipher ECC-box encodes the plaintext so that it can be recovered correctly after corruption by the errors introduced in the ciphertext deliberately. Block scheme of the novel stream cipher family i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1605.02954  شماره 

صفحات  -

تاریخ انتشار 2016