Proceedings of the 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013)

Various New Methods of Implementing AVK

Authors
T. Bhunai
Corresponding Author
T. Bhunai
Available Online July 2013.
DOI
10.2991/cse.2013.35How to use a DOI?
Keywords
Perfect Security, RSA, DES, AVK, Computing & Shifting AVK (CSAVK), Decimal Shifting AVK (DSAVK), Randomness.
Abstract

Researchers have proposed many data encryption techniques / standards to protect data from various types of attacks like brute force attack, frequency attack and differential frequency attack. Shannon [1-2] documented the theory of perfect secrecy with time variant key. An idea of time variant key namely Automatic Variable Key (AVK) was introduced by Bhinia [4-6]. The superiority of AVK was widely experimented by many researchers over a fixed or single key [7-14]. This paper proposed new protocols of Automatic variable Key (AVK) in cryptography.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013)
Series
Advances in Intelligent Systems Research
Publication Date
July 2013
ISBN
978-90786-77-70-3
ISSN
1951-6851
DOI
10.2991/cse.2013.35How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - T. Bhunai
PY  - 2013/07
DA  - 2013/07
TI  - Various New Methods of Implementing AVK
BT  - Proceedings of the 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013)
PB  - Atlantis Press
SP  - 151
EP  - 154
SN  - 1951-6851
UR  - https://doi.org/10.2991/cse.2013.35
DO  - 10.2991/cse.2013.35
ID  - Bhunai2013/07
ER  -