Various New Methods of Implementing AVK
- T. Bhunai
- Corresponding Author
- T. Bhunai
Available Online July 2013.
- https://doi.org/10.2991/cse.2013.35How to use a DOI?
- Perfect Security, RSA, DES, AVK, Computing & Shifting AVK (CSAVK), Decimal Shifting AVK (DSAVK), Randomness.
- Researchers have proposed many data encryption techniques / standards to protect data from various types of attacks like brute force attack, frequency attack and differential frequency attack. Shannon [1-2] documented the theory of perfect secrecy with time variant key. An idea of time variant key namely Automatic Variable Key (AVK) was introduced by Bhinia [4-6]. The superiority of AVK was widely experimented by many researchers over a fixed or single key [7-14]. This paper proposed new protocols of Automatic variable Key (AVK) in cryptography.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - T. Bhunai PY - 2013/07 DA - 2013/07 TI - Various New Methods of Implementing AVK BT - 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013) PB - Atlantis Press UR - https://doi.org/10.2991/cse.2013.35 DO - https://doi.org/10.2991/cse.2013.35 ID - Bhunai2013/07 ER -