scholarly journals A New Key Generation Technique based on Neural Networks for Lightweight Block Ciphers

Author(s):  
Sohel Rana ◽  
M. Rubaiyat Hossain Mondal ◽  
A. H. M. Shahariar Parvez
2008 ◽  
Vol 178 (15) ◽  
pp. 3118-3132 ◽  
Author(s):  
Abbas Ghaemi Bafghi ◽  
Reza Safabakhsh ◽  
Babak Sadeghiyan

2017 ◽  
Vol 10 (9) ◽  
pp. 2895
Author(s):  
G. Manikandan ◽  
P. Rajendiran ◽  
V. Harish ◽  
Nooka Sai Kumar

Author(s):  
R. Singh

In this article we implement a client server model using limited-used key generation scheme (Kungpisdan, Le, & Srinivasan, 2004) to generate a set of session keys that are never transmitted, which means that there is no chance for the attacker to sniff the packets and retrieve keys while they are being transmitted. These session keys are used for encrypting and hashing the data to be transmitted from mobile client device to the servers in wired network and vice versa. The updating of the session keys used in this technique does not rely on any long-term shared key, instead the process is based upon the last session key used. This technique of elevating the frequency of the key update to the next possible level makes the system much more secure than the other present techniques. In addition to providing better security, this technique also enhances the performance of a limited resource device by avoiding the repeated generation of keys on it.


Author(s):  
Kuppusamy Krishnamoorthy ◽  
Mahalakshmi Jeyabalu

Security of images in transmission medium is most prime issue found in literature. Encryption of images is a way to secure it from unauthorized access. The authors in this chapter insist on the encryption of images via block ciphers. Block ciphers works simultaneously as well as on chunks. In this chapter, an encryption method using improved cipher block chaining is proposed to encrypt RGB color images. For every encryption methodology, key generation process is the most important phase. The authors proposed sub-optimal key generation algorithm and this nature inspired optimization technique reveals complex keys, remains very useful for decision making in dynamic environment. Key generation is crafted as complex with this mathematical model that overcomes the predicament key problem exists in existing methods and upgrades quality of encryption. Results of the proposed algorithm show the efficiency and its resistance against various cryptanalytic attacks.


Sign in / Sign up

Export Citation Format

Share Document