Proceedings of the 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013)

Various New Methods of Implementing AVK

Authors
T. Bhunai
Corresponding Author
T. Bhunai
Available Online July 2013.
DOI
https://doi.org/10.2991/cse.2013.35How to use a DOI?
Keywords
Perfect Security, RSA, DES, AVK, Computing & Shifting AVK (CSAVK), Decimal Shifting AVK (DSAVK), Randomness.
Abstract
Researchers have proposed many data encryption techniques / standards to protect data from various types of attacks like brute force attack, frequency attack and differential frequency attack. Shannon [1-2] documented the theory of perfect secrecy with time variant key. An idea of time variant key namely Automatic Variable Key (AVK) was introduced by Bhinia [4-6]. The superiority of AVK was widely experimented by many researchers over a fixed or single key [7-14]. This paper proposed new protocols of Automatic variable Key (AVK) in cryptography.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Proceedings
2nd International Conference on Advances in Computer Science and Engineering (CSE 2013)
Part of series
Advances in Intelligent Systems Research
Publication Date
July 2013
ISBN
978-90786-77-70-3
ISSN
1951-6851
DOI
https://doi.org/10.2991/cse.2013.35How to use a DOI?
Open Access
This is an open access article distributed under the CC BY-NC license.

Cite this article

TY  - CONF
AU  - T. Bhunai
PY  - 2013/07
DA  - 2013/07
TI  - Various New Methods of Implementing AVK
BT  - 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013)
PB  - Atlantis Press
SN  - 1951-6851
UR  - https://doi.org/10.2991/cse.2013.35
DO  - https://doi.org/10.2991/cse.2013.35
ID  - Bhunai2013/07
ER  -