Symmetric Key Cryptography Algorithm for Data Security
T. Kulhalli. International Journal of Trend in Scientific Research and Development, 2 (2):
586-589(February 2018)
Abstract
Ambiguous Multi-Symmetric Cryptography (AMSC) that hide multiple plain-texts in a cipher-text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed. The proposed method AMSC is a cryptographic primitive that preserves plausible deniability after a cryptographic key is discovered. We evaluate AMSC in terms of security and complexity. The security analysis shows that our scheme withstands all security attack models with different knowledge of the adversary. In terms of time complexity, AMSC produces the cipher-text in polynomial time with respect to the number and size of the plaintexts and keys. AMSC has two main applications: a) It sends multiple messages for multiple receivers through one cipher-text. b) It sends one real message and multiple decoys to defeat attacks by providing security beyond conventional brute-force bounds. For both applications, AMSC can be used to deny encryption. Tushar Anil Patil | Prof. Dr. Mrs. K. V. Kulhalli"Symmetric Key Cryptography Algorithm for Data Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd9444.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/9444/symmetric-key-cryptography-algorithm-for-data-security/tushar-anil-patil
%0 Journal Article
%1 noauthororeditor
%A Kulhalli, Tushar Anil Patil Prof. Dr. Mrs. K. V.
%D 2018
%J International Journal of Trend in Scientific Research and Development
%K & Ambiguous Brute Cipher-text Communication Deniable Electronics Engineering Honey Multi Symmetric attack cryptography encryption encryption. force only
%N 2
%P 586-589
%T Symmetric Key Cryptography Algorithm for Data Security
%U http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/9444/symmetric-key-cryptography-algorithm-for-data-security/tushar-anil-patil
%V 2
%X Ambiguous Multi-Symmetric Cryptography (AMSC) that hide multiple plain-texts in a cipher-text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed. The proposed method AMSC is a cryptographic primitive that preserves plausible deniability after a cryptographic key is discovered. We evaluate AMSC in terms of security and complexity. The security analysis shows that our scheme withstands all security attack models with different knowledge of the adversary. In terms of time complexity, AMSC produces the cipher-text in polynomial time with respect to the number and size of the plaintexts and keys. AMSC has two main applications: a) It sends multiple messages for multiple receivers through one cipher-text. b) It sends one real message and multiple decoys to defeat attacks by providing security beyond conventional brute-force bounds. For both applications, AMSC can be used to deny encryption. Tushar Anil Patil | Prof. Dr. Mrs. K. V. Kulhalli"Symmetric Key Cryptography Algorithm for Data Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd9444.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/9444/symmetric-key-cryptography-algorithm-for-data-security/tushar-anil-patil
@article{noauthororeditor,
abstract = {Ambiguous Multi-Symmetric Cryptography (AMSC) that hide multiple plain-texts in a cipher-text using the same number of keys. The goal of this method is to overcome the problem of symmetric cryptography failure when the shared key is exposed. The proposed method AMSC is a cryptographic primitive that preserves plausible deniability after a cryptographic key is discovered. We evaluate AMSC in terms of security and complexity. The security analysis shows that our scheme withstands all security attack models with different knowledge of the adversary. In terms of time complexity, AMSC produces the cipher-text in polynomial time with respect to the number and size of the plaintexts and keys. AMSC has two main applications: a) It sends multiple messages for multiple receivers through one cipher-text. b) It sends one real message and multiple decoys to defeat attacks by providing security beyond conventional brute-force bounds. For both applications, AMSC can be used to deny encryption. Tushar Anil Patil | Prof. Dr. Mrs. K. V. Kulhalli"Symmetric Key Cryptography Algorithm for Data Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd9444.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/9444/symmetric-key-cryptography-algorithm-for-data-security/tushar-anil-patil
},
added-at = {2018-09-01T12:51:01.000+0200},
author = {Kulhalli, Tushar Anil Patil Prof. Dr. Mrs. K. V.},
biburl = {https://www.bibsonomy.org/bibtex/27ed3e014390c91880b740a3448d2344f/ijtsrd},
interhash = {8dc22b05d5276b4dfb79d09e2583cb3d},
intrahash = {7ed3e014390c91880b740a3448d2344f},
issn = {2456-6470},
journal = {International Journal of Trend in Scientific Research and Development},
keywords = {& Ambiguous Brute Cipher-text Communication Deniable Electronics Engineering Honey Multi Symmetric attack cryptography encryption encryption. force only},
language = {English},
month = feb,
number = 2,
pages = {586-589},
timestamp = {2018-10-02T11:01:27.000+0200},
title = {Symmetric Key Cryptography Algorithm for Data Security
},
url = {http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/9444/symmetric-key-cryptography-algorithm-for-data-security/tushar-anil-patil},
volume = 2,
year = 2018
}