2012
DOI: 10.24297/ijct.v3i2c.2896
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Security Through Simple Symmetric Key Algorithm Based on Modulo 37

Abstract: The demand for adequate security to electronic data system grows high over the decades. Security is the one of the biggest concern in different type of networks. Due to diversify nature of network, security breaching became a common issue in different form of networks. Solutions for network security comes with concepts like cryptography in which distribution of keys have been done. Encryption and key generation became a vital tool for preventing the threats to data sharing and tool to preserve the data integri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…• Although the DES standard is public, the design criteria used are classified. • There has been considerable controversy over the design, particularly in the choice of a 56-bit key Prakash Kuppuswamy, Dr.Saeed Q Y Al-Khalidi, in the year 2012 proposed an algorithm based on Modulo 37 [14].…”
Section: Related Workmentioning
confidence: 99%
“…• Although the DES standard is public, the design criteria used are classified. • There has been considerable controversy over the design, particularly in the choice of a 56-bit key Prakash Kuppuswamy, Dr.Saeed Q Y Al-Khalidi, in the year 2012 proposed an algorithm based on Modulo 37 [14].…”
Section: Related Workmentioning
confidence: 99%
“…Combination of two different algorithms into a single hybrid algorithm is motivated by the possibility and it gives better performance and securities [18], [19]. Consequently, hybrid algorithm techniques provide a new class of algorithms [20], [21]. A hybrid scheme provides more data confidentiality which is to be achieved by this hybrid cryptosystem which contains all the interchangeable and dissimilar cryptography rules [22], [23].…”
Section: Introductionmentioning
confidence: 99%
“…We are naming this linear based algorithm as New linear block cipher or Nlbc. Kuppuswamy and Al-Khalidi (2012) proposed research main goal is to reflect the importance of security in network and provide the better encryption technique for currently implemented encryption techniques in simple and powerful method. In this research we have proposed a modular 37 and select any number and calculate inverse of the selected integer using modular 37.…”
Section: Introductionmentioning
confidence: 99%