SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS

The number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used. Even multiple passwords are not preferred due to low entropies. The biometric is a very costly technique;...

Full description

Bibliographic Details
Main Authors: M. L. SINGH, AJAY KAKKAR, P. K. BANSAL
Format: Article
Language:English
Published: Taylor's University 2012-08-01
Series:Journal of Engineering Science and Technology
Subjects:
Online Access:http://jestec.taylors.edu.my/Vol%207%20Issue%204%20August%2012/Vol_7_4_505-516_AJAY%20KAKKAR.pdf
id doaj-f0ad963cc9c447e9a4bd77e11600f429
record_format Article
spelling doaj-f0ad963cc9c447e9a4bd77e11600f4292020-11-25T01:10:15ZengTaylor's UniversityJournal of Engineering Science and Technology1823-46902012-08-0174505516SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONSM. L. SINGHAJAY KAKKARP. K. BANSALThe number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used. Even multiple passwords are not preferred due to low entropies. The biometric is a very costly technique; moreover they may produce harmful effects to the body. Cryptography is used to avoid unauthorized access of data. It includes quite simple encryption algorithm and keys generated from the data. This paper deals with the parameters such as number of users, failure rate of various keys, recovery mechanism, encryption, transmission, decryption and latency time, etc; required for secure transmission of data. The proposed algorithm shows that all the stages are mutually independent from each other. It also provides the facility to use compression and re-encryption techniques.http://jestec.taylors.edu.my/Vol%207%20Issue%204%20August%2012/Vol_7_4_505-516_AJAY%20KAKKAR.pdfEncryptionS-BoxesPaddingKeysFailure rate
collection DOAJ
language English
format Article
sources DOAJ
author M. L. SINGH
AJAY KAKKAR
P. K. BANSAL
spellingShingle M. L. SINGH
AJAY KAKKAR
P. K. BANSAL
SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS
Journal of Engineering Science and Technology
Encryption
S-Boxes
Padding
Keys
Failure rate
author_facet M. L. SINGH
AJAY KAKKAR
P. K. BANSAL
author_sort M. L. SINGH
title SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS
title_short SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS
title_full SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS
title_fullStr SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS
title_full_unstemmed SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS
title_sort secure communication by using multiple keys having variable length in a real time environment for multiple stations
publisher Taylor's University
series Journal of Engineering Science and Technology
issn 1823-4690
publishDate 2012-08-01
description The number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used. Even multiple passwords are not preferred due to low entropies. The biometric is a very costly technique; moreover they may produce harmful effects to the body. Cryptography is used to avoid unauthorized access of data. It includes quite simple encryption algorithm and keys generated from the data. This paper deals with the parameters such as number of users, failure rate of various keys, recovery mechanism, encryption, transmission, decryption and latency time, etc; required for secure transmission of data. The proposed algorithm shows that all the stages are mutually independent from each other. It also provides the facility to use compression and re-encryption techniques.
topic Encryption
S-Boxes
Padding
Keys
Failure rate
url http://jestec.taylors.edu.my/Vol%207%20Issue%204%20August%2012/Vol_7_4_505-516_AJAY%20KAKKAR.pdf
work_keys_str_mv AT mlsingh securecommunicationbyusingmultiplekeyshavingvariablelengthinarealtimeenvironmentformultiplestations
AT ajaykakkar securecommunicationbyusingmultiplekeyshavingvariablelengthinarealtimeenvironmentformultiplestations
AT pkbansal securecommunicationbyusingmultiplekeyshavingvariablelengthinarealtimeenvironmentformultiplestations
_version_ 1725175958581805056