2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO) 2015
DOI: 10.1109/isco.2015.7282273
|View full text |Cite
|
Sign up to set email alerts
|

A novel symmetric cryptography algorithm for fast and secure encryption

Abstract: Data encryption is the best way to provide secure communication. Even though a lot of encryption schemes are available, this paper proposes a simple, fast and secure encryption scheme. The method is suitable to encrypt smaller as well as for larger files. The approach includes two files: symmetric key file and message file, both of any format opted by the user. In this approach the hackers can't even crack which type of message file was it. So breaking cipher text becomes impossible in effect. The proposed sym… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 23 publications
(10 reference statements)
0
5
0
Order By: Relevance
“…We'll use an example to illustrate how to determine C2's firstorder relation. Table 2 indicates that the numbers [1,6,10], [5,9], [4,8], [3,7], and [2] correspond to the first orbit, and that the letter y stands in for the class. The correct method here is to multiply by 6, although any other method would work as well.…”
Section: Permutation Progenitorsmentioning
confidence: 99%
See 1 more Smart Citation
“…We'll use an example to illustrate how to determine C2's firstorder relation. Table 2 indicates that the numbers [1,6,10], [5,9], [4,8], [3,7], and [2] correspond to the first orbit, and that the letter y stands in for the class. The correct method here is to multiply by 6, although any other method would work as well.…”
Section: Permutation Progenitorsmentioning
confidence: 99%
“…We have ti's of order 2, if memory serves. To generate a finite homomorphic image of order 1440, we factor G by the following relations: (y −1 * x −1 * t) 6 , (x −1 * y −1 * x * t) 4 , (x 2 * t) 8 , (x * t) 5 . The enumeration of double cosets starts with an estimate of how many such sets there are likely to be.…”
Section: Table 3: Powers Of Tmentioning
confidence: 99%
“…To design cipher algorithms, different technologies, including mathematics, physics, biometric, biology, and social engineering, are used [ 21 , 22 ]. Also, concepts and basic sciences such as theory of numbers, Boolean functions [ 23 ], and random functions [ 24 , 25 ] are very essential. Depending of the application of cipher algorithms, various technical and nontechnical requirements should be considered for their design.…”
Section: Cybernetic Supermodelmentioning
confidence: 99%
“…• A key deviation is involved in the key expansion stage, in which, a constant is added for each sub-key to avoid the weak keys [21].…”
Section: Introductionmentioning
confidence: 99%