2022
DOI: 10.11591/ijece.v12i4.pp3960-3969
|View full text |Cite
|
Sign up to set email alerts
|

Stream-keys generation based on graph labeling for strengthening Vigenere encryption

Abstract: This paper address the cryptographic keys management problem: how to generate the cryptographic keys and apply them to secure encryption. The purpose of this research was to study on utilizing graph labeling for generating stream-keys and implementing the keys for strengthening Vigenere encryption. To achieve this objective, the research was carried out in four stages: developing an algorithm for generating stream-keys, testing the randomness of the constructed keys, implementing the eligible keys in a modifie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…The need for a trusted third party also becomes redundant. We also subject our key generation technique to entropy analysis and prove its efficacy compared to the traditional random number generator technique and super H-antimagic total labeling (SHATL) [27].…”
Section: Figure 1: Entropy Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The need for a trusted third party also becomes redundant. We also subject our key generation technique to entropy analysis and prove its efficacy compared to the traditional random number generator technique and super H-antimagic total labeling (SHATL) [27].…”
Section: Figure 1: Entropy Analysismentioning
confidence: 99%
“…In [27], graph labeling such as super H-antimagic total labeling (SHATL) to generate stream-keys and providing different encryption keys for different blocks in a block based cipher with low storage capacity is discussed. Although different authors propose different labeling techniques for cryptosystems none of them discuss metrics to prove their efficacy.We use the concept of entropy to establish the randomness of our key generation technique.…”
mentioning
confidence: 99%
“…The lower bound of 𝑟𝑣𝑎𝑐(𝐺) that found by Marsidi, et al is as follows. Remark 1 [16] Let 𝐺 be a connected graph, 𝑟𝑣𝑎𝑐(𝐺) ≥ 𝑟𝑣𝑐(𝐺).…”
Section: Preliminariesmentioning
confidence: 99%
“…The term cryptosystem is commonly used to refer to public key techniques; however, for symmetric key techniques, both "cipher" and "cryptosystem" are used. The strength of cryptography protocols relies on the encryption-decryption keys management: how to protect the keys from disclose to unauthorized parties [16].…”
Section: Introductionmentioning
confidence: 99%