A Novel Approach in Communication Security of Internet-of-Vehicles Using the Concept of Recurrence Relation and Symmetric Key

Author(s):  
Anirban Bhowmick ◽  
Sunil Karforma ◽  
Joydeep Dey ◽  
Arindam Sarkar
2018 ◽  
Vol 14 (12) ◽  
pp. 155014771881505 ◽  
Author(s):  
Manar Abu Talib ◽  
Sohail Abbas ◽  
Qassim Nasir ◽  
Mohamad Fouzi Mowakeh

Cryptography ◽  
2020 ◽  
pp. 239-256
Author(s):  
Shaligram Prajapat ◽  
Ramjeevan Singh Thakur

“Key” plays a vital role in every symmetric key cryptosystem. The obvious way of enhancing security of any cryptosystem is to keep the key as large as possible. But it may not be suitable for low power devices since higher computation will be done for longer keys and that will increase the power requirement which decreases the device's performance. In order to resolve the former specified problem an alternative approach can be used in which the length of key is fixed and its value varies in every session. This is Time Variant Key approach or Automatic Variable Key (AVK) approach. The Security of AVK based cryptosystem is enhanced by exchanging some parameters instead of keys between the communicating parties, then these parameters will be used to generate required keys at the receiver end. This chapter presents implementation of the above specified Mechanism. A model has been demonstrated with parameterized scheme and issues in AVK approach. Further, it has been analyzed from different users' perspectives. This chapter also highlights the benefits of AVK model to ensure two levels of security with characterization of methods for AVK and Estimation of key computation based on parameters only. The characteristic components of recent styles of key design with consideration of key size, life time of key and breaking threshold has also been pointed out. These characteristics are essential in the design of efficient symmetric key cryptosystem. The novel approach of AVK based cryptosystem is suitable for low power devices and useful for exchanging very large objects or files. This scheme has been demonstrated with Fibonacci-Q matrix and sparse matrix based diffused key information exchange procedures. These models have been further tested from perspective of hackers and cryptanalyst, to exploit any weakness with fixed size dynamic keys.


Author(s):  
SHALIGRAM PRAJAPAT ◽  
AMBER JAIN ◽  
R. S. THAKUR

Information security is essential nowadays. Large number of cipher generation and decryption algorithms exists and are being evolved due to increasing demand of users and e-commerce services. In this paper we propose a new approach for secure information transmission over communication channel with key variability concept in symmetric key algorithms using Fibonacci Qmatrix. Proposed approach will not only enhance the security of information but also saves computation time and reduces power requirements that will find it’s suitability for future hand held devices and online transaction processing.


2019 ◽  
Vol 8 (3) ◽  
pp. 3679-3685

Symmetric-key cryptography is a classical cryptography in which both sender and receiver use the same key K to encrypt and decrypt the message. The main challenge between sender and receiver is to agree upon the secret-key which should not be revealed to public. Key management is the major issue in symmetric-key cryptosystem. To avoid these, a novel approach in generating the keystream Ks for any symmetric-key algorithms using U-matrix is proposed in this paper. The advantage of this method is generation of key K from Ks is based on some deterministic procedure which is then applied to DES algorithm and K is not necessarily remembered by both sender and receiver. Further, in each round different key is used as opposed to usage of single key in classical DES. Experimental results clearly show the security is increased when it is compared with classical DES.


2020 ◽  
Vol 33 (11) ◽  
pp. e4433
Author(s):  
Ting Zhang ◽  
Degan Zhang ◽  
Jinxin Gao ◽  
Jie Chen ◽  
Kaiwen Jiang

Cryptography ◽  
2020 ◽  
pp. 193-213
Author(s):  
Srinivasa K. G. ◽  
Siddesh G. M. ◽  
Srinidhi Hiriyannaiah ◽  
Anusha Morappanavar ◽  
Anurag Banerjee

The world of digital communication consists of various applications which uses internet as the backbone for communication. These applications consist of data related to the users of the application, which is confidential and integrity needs to be maintained to protect against unauthorized access and use. In the information hiding field of research, Cryptography is one of the wide techniques used to provide security to the internet applications that overcome the challenges like confidentiality, integrity, authentication services etc. In this paper, we present a novel approach on symmetric key cryptography technique using genetic algorithm that is implemented on CUDA architecture.


Sign in / Sign up

Export Citation Format

Share Document