2021
DOI: 10.37394/23205.2021.20.1
|View full text |Cite
|
Sign up to set email alerts
|

Generation of Random Key Stream using Word Grid Puzzle for the Applications of Cryptography

Abstract: The amount of digital data created and shared via internet has been increasing every day. The number of security attacks and threats has been increased due to poor selection of secret keywords and passwords.Cryptographic algorithms and security protocols are primarily rely on random keys to provide security services.Random numbers and key stream are playing major role in applying the security mechanisms in real time. In this paper, a novel method to generate random key stream using word grid puzzle is proposed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Sivakumar and Venkatesan [21] suggested matrix reordering based method of color image encryptiondecryption with an average throughput. The security level and efficiency parameters of this method were increased, but a large amount of memory space was needed for the private secret key due to its size and complexity.…”
Section: Figure 1 Encryption-decryption Processmentioning
confidence: 99%
“…Sivakumar and Venkatesan [21] suggested matrix reordering based method of color image encryptiondecryption with an average throughput. The security level and efficiency parameters of this method were increased, but a large amount of memory space was needed for the private secret key due to its size and complexity.…”
Section: Figure 1 Encryption-decryption Processmentioning
confidence: 99%
“…In image encryption, if the histogram of the composite image does not change, it is sometimes invalid for statistical attacks. To further develop the encryption process and the confusion shortcoming, this paper's proposed method is a bit-level replacement dependent on the diffusion effect of the particular confusion [12].…”
Section: Introductionmentioning
confidence: 99%