Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/9752
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Goswami, R.S. | |
dc.contributor.author | Chakraborty, S.K. | |
dc.contributor.author | Bhunia, C.T. | |
dc.date.accessioned | 2020-03-31T06:51:24Z | - |
dc.date.available | 2020-03-31T06:51:24Z | - |
dc.date.issued | 2016 | |
dc.identifier.citation | International Journal of Security and its Applications, 2016, Vol.10, 2, pp.279-286 | en_US |
dc.identifier.uri | 10.14257/ijsia.2016.10.2.25 | |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/9752 | - |
dc.description.abstract | Time variant key is one of the great research challenges in the field of cryptography for achieving the perfect security. Automatic variable Key (AVK) has been well researched and established as an important technique to realize time variant key in achieving towards perfect security. In AVK, proposed by Bhunia, the key is made to vary from data to data or session to session that is essentially required for achieving perfect secrecy. The variable key is generated in each time a data is sent and or a session is made. The time variant key (in AVK) is found to reduce the frequency attack as seen in earlier research, while such key was in applied in AES algorithm. In the present experimental research the authors study the application of AVK & Computing & Shifting AVK (CSAVK) in RSA to examine the reducing effect of frequency attack. 2016 SERSC. | en_US |
dc.title | A study to examine the superiority of CSAVK, AVK over conventional encryption with a single key | en_US |
dc.type | Article | en_US |
Appears in Collections: | 1. Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.