Various New Methods of Implementing AVK
Authors
T. Bhunai
Corresponding Author
T. Bhunai
Available Online July 2013.
- DOI
- 10.2991/cse.2013.35How to use a DOI?
- Keywords
- Perfect Security, RSA, DES, AVK, Computing & Shifting AVK (CSAVK), Decimal Shifting AVK (DSAVK), Randomness.
- Abstract
Researchers have proposed many data encryption techniques / standards to protect data from various types of attacks like brute force attack, frequency attack and differential frequency attack. Shannon [1-2] documented the theory of perfect secrecy with time variant key. An idea of time variant key namely Automatic Variable Key (AVK) was introduced by Bhinia [4-6]. The superiority of AVK was widely experimented by many researchers over a fixed or single key [7-14]. This paper proposed new protocols of Automatic variable Key (AVK) in cryptography.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - T. Bhunai PY - 2013/07 DA - 2013/07 TI - Various New Methods of Implementing AVK BT - Proceedings of the 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013) PB - Atlantis Press SP - 151 EP - 154 SN - 1951-6851 UR - https://doi.org/10.2991/cse.2013.35 DO - 10.2991/cse.2013.35 ID - Bhunai2013/07 ER -