A NEW CO-OPERATIVE KEY GENERATION TECHNIQUE FOR SYMMETRIC ENCRYPTION

DR.V. Nanda Kumar

Abstract


This paper proposes a new method for generating symmetric keys. The keys are based on a co-operative key simulation model with participation from the sender and receiver. Since this method uses a secret key, it enjoys the benefits of the private key cryptography, using two 64-bit keys in parallel for generating a single 128-bit temporary key. The efficiency of the algorithm is proved on a mathematical basis.


Keywords


Co-operative keys, Encryption, Symmetric Encryption, CKE, Block Cipher

References


N. Koblitz. A Course in Number Theory and Cryptography. Springer-Verlag, New York, second edition, 1994.

A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, Florida, USA, 1997.

William Stallings, “Cryptography and Network Security Principles and Practices, Fourth Edition", Prentice Hall, 2005.

B. Schneier. Applied Cryptography. John Wiley & Sons Inc., New York, New

York, USA, 2nd edition, 1996.

Janaka Deepakumara, Howard M. Heys, and R. Venkatesan. "FPGA Implementation of MD5 Hash Algorithm". In Canadian Conference on Electrical and Computer Engineering (CCECE), May 2001.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.