2011 International Conference on Communication Systems and Network Technologies 2011
DOI: 10.1109/csnt.2011.25
|View full text |Cite
|
Sign up to set email alerts
|

A New Symmetric Key Cryptography Algorithm Using Extended MSA Method: DJSA Symmetric Key Algorithm

Abstract: In the present work the authors introduced a new symmetric key cryptographic method for encryption as well as decryption of any file such as binary file, text file or any other file. Nath et. al.(1) developed an algorithm called MSA for encryption and decryption of any file using a random key square matrix containing 256 elements. The weak point of MSA algorithm is that if someone applies the brute force method then he has to give a trial for factorial 256 to find the actual key matrix. Now in the modern world… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(19 citation statements)
references
References 4 publications
0
19
0
Order By: Relevance
“…This section describes existing work, "A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm" [1]. In this they are using a symmetric key method where they have used a random key generator for generating the initial key and that key is used for encrypting the given source file.…”
Section: Existing Workmentioning
confidence: 99%
“…This section describes existing work, "A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm" [1]. In this they are using a symmetric key method where they have used a random key generator for generating the initial key and that key is used for encrypting the given source file.…”
Section: Existing Workmentioning
confidence: 99%
“…Chatterjee et al (2011) [9] presented a new symmetric key algorithm using extended MSA method: DJSA symmetric key algorithm. Its advantage is that it is almost impossible to break without its key matrix being compromised.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…Lanxiang Chen et al [7] Comparison between public key and symmetric key cryptography Fan Wu et al [8] Accelerating symmetric key cryptography using GPU Dripto Chatterjee et al [9] DJSA symmetric key cryptography…”
Section: Summary Of Literature Reviewmentioning
confidence: 99%
“…The hybrid cloud uses hybrid approach.The above classification is well accepted in the industry. David Linthicum [2] shows further classification on the basis of service provided. These are listed below: Storage-asaservice, Database-as-a-service, Information-as-a-service, Process-as-a-service, Application-as-a-service, Platformas-a-service, Integration-as-a-service, Security-as-aservice,Testing-as-a-service, Infrastructure-as-a-service.…”
Section: Introductionmentioning
confidence: 99%