A Review of Geometry Based Symmetric Key Encryption Using Ellipse
نویسندگان
چکیده
Cryptography is the way to secure the data to achieve higher reliability during the communication process. There exist a number of cryptographic approaches. This paper defines a geometry based Symmetric cryptography algorithm that is used to encrypt the input data. As the name suggests the approach is based on the geometric figure to perform the cryptography. In this work, we will define an elliptic shape geometry to generate the dynamic key so as to perform the dynamic symmetric encryption of input text. Based on the geometric elliptic figure’s properties the key will be generated and by using the key parameters the length and breadth of Cartesian plain will be defined. Once the area will be defined, the next work is to define a group of ellipses and to perform the translation and rotation of axis. By extracting the pixel positions on these ellipses and to place the input data respectively to these locations the cryptography will be performed. The actual work of this algorithm is to change the data locations instead of changing the data. The secure and reliable encoding of the data is expected from the work. Key Terms: Encryption; Symmetric Key Encryption; Ellipse Generation; Translation; Rotation Full Text: http://www.ijcsmc.com/docs/papers/June2013/V2I6201303.pdf
منابع مشابه
Browse searchable encryption schemes: Classification, methods and recent developments
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
متن کاملNumerical Simulation of the Wake Flow Behind an Ellipse using Random Vortex Method (RESEARCH NOTE)
Direct numerical simulation of the wake flow around and behind a planar ellipse using a random vortex method is presented. Fluid is considered incompressible and the aspect ratios of ellipse and the angles of attacks are varied. This geometry can be a logical prelude to the more complex geometries, but less time dependent experimental measurements are available to validate the numerical results...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملA Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کاملImage encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013