SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS
The number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used. Even multiple passwords are not preferred due to low entropies. The biometric is a very costly technique;...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Taylor's University
2012-08-01
|
Series: | Journal of Engineering Science and Technology |
Subjects: | |
Online Access: | http://jestec.taylors.edu.my/Vol%207%20Issue%204%20August%2012/Vol_7_4_505-516_AJAY%20KAKKAR.pdf |
id |
doaj-f0ad963cc9c447e9a4bd77e11600f429 |
---|---|
record_format |
Article |
spelling |
doaj-f0ad963cc9c447e9a4bd77e11600f4292020-11-25T01:10:15ZengTaylor's UniversityJournal of Engineering Science and Technology1823-46902012-08-0174505516SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONSM. L. SINGHAJAY KAKKARP. K. BANSALThe number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used. Even multiple passwords are not preferred due to low entropies. The biometric is a very costly technique; moreover they may produce harmful effects to the body. Cryptography is used to avoid unauthorized access of data. It includes quite simple encryption algorithm and keys generated from the data. This paper deals with the parameters such as number of users, failure rate of various keys, recovery mechanism, encryption, transmission, decryption and latency time, etc; required for secure transmission of data. The proposed algorithm shows that all the stages are mutually independent from each other. It also provides the facility to use compression and re-encryption techniques.http://jestec.taylors.edu.my/Vol%207%20Issue%204%20August%2012/Vol_7_4_505-516_AJAY%20KAKKAR.pdfEncryptionS-BoxesPaddingKeysFailure rate |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
M. L. SINGH AJAY KAKKAR P. K. BANSAL |
spellingShingle |
M. L. SINGH AJAY KAKKAR P. K. BANSAL SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS Journal of Engineering Science and Technology Encryption S-Boxes Padding Keys Failure rate |
author_facet |
M. L. SINGH AJAY KAKKAR P. K. BANSAL |
author_sort |
M. L. SINGH |
title |
SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS |
title_short |
SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS |
title_full |
SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS |
title_fullStr |
SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS |
title_full_unstemmed |
SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS |
title_sort |
secure communication by using multiple keys having variable length in a real time environment for multiple stations |
publisher |
Taylor's University |
series |
Journal of Engineering Science and Technology |
issn |
1823-4690 |
publishDate |
2012-08-01 |
description |
The number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used. Even multiple passwords are not preferred due to low entropies. The biometric is a very costly technique; moreover they may produce harmful effects to the body. Cryptography is used to avoid unauthorized access of data. It includes quite simple encryption algorithm and keys generated from the data. This paper deals with the parameters such as number of users, failure rate of various keys, recovery mechanism, encryption, transmission, decryption and latency time, etc; required for secure transmission of data. The proposed algorithm shows that all the stages are mutually independent from each other. It also provides the facility to use compression and re-encryption techniques. |
topic |
Encryption S-Boxes Padding Keys Failure rate |
url |
http://jestec.taylors.edu.my/Vol%207%20Issue%204%20August%2012/Vol_7_4_505-516_AJAY%20KAKKAR.pdf |
work_keys_str_mv |
AT mlsingh securecommunicationbyusingmultiplekeyshavingvariablelengthinarealtimeenvironmentformultiplestations AT ajaykakkar securecommunicationbyusingmultiplekeyshavingvariablelengthinarealtimeenvironmentformultiplestations AT pkbansal securecommunicationbyusingmultiplekeyshavingvariablelengthinarealtimeenvironmentformultiplestations |
_version_ |
1725175958581805056 |