2013
DOI: 10.5815/ijcnis.2013.10.06
|View full text |Cite
|
Sign up to set email alerts
|

KED - A Symmetric Key Algorithm for Secured Information Exchange Using Modulo 69

Abstract: Exchange of data over the internet is increasing day by day. Security is the main issue in communication over a network. Protection must be given against intruders. Hence Cryptography plays a vital role in providing security. There are two basic types of cryptography: Symmetric Key and Asymmetric Key. Symmetric Key uses same or single key for encryption and decryption whereas Asymmetric Key uses separate keys for encryption and decryption. The most commonly used are the Symmetric Key algorithms. The strength o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Warjri [22] proposed a new symmetric key algorithm called as KED (Key Encryption Decryption) and a new key generation method. Using modulo 69 and inverse modulo69, the proposed algorithm was used for encryption and decryption process, in which the same key is used both for encryption and decryption.…”
mentioning
confidence: 99%
“…Warjri [22] proposed a new symmetric key algorithm called as KED (Key Encryption Decryption) and a new key generation method. Using modulo 69 and inverse modulo69, the proposed algorithm was used for encryption and decryption process, in which the same key is used both for encryption and decryption.…”
mentioning
confidence: 99%
“…are used and gave good results [1][2][3][4][5]. In [6], Symmetric Key Encryption Decryption using modulo 69 is proposed for encryption and decryption process.…”
Section: Introductionmentioning
confidence: 99%