Journal Articles
Permanent URI for this collectionhttps://dspacenew8-imu.refread.com/handle/123456789/2069
Browse
5 results
Search Results
Item Cryptographic key communication protocol using elliptic curve over finite field with nested construction of hash message authentication code(International Journal of Advanced Research in Computer Science, 2018) Suneetha, Ch.; Sravana Kumar, D.; Sirisha, P.As the internet is the basic means of communication nowadays confirming the integrity and authenticity of the received data is a prime necessity in communication network. The present paper explores the key communication protocol from one entity to the other rather than sharing the part of the key by both the entities using elliptic curve over finite field. In addition one Nested construction of Hash Message Authentication Code (NMAC) is tagged to the communicated key that guards the communicated key for verification using cartographic hash function. The protocol designed here is more suitable for communicating high secured pass words and PIN numbers in monetary transactionsItem Secure cryptosystem based on braiding/entanglement of pauli 5/2 matrices(Bulletin of Mathematics and Statistics Research, 2016-11) Sirisha, P.; Suneetha, Ch."Cryptography is the art or science encompassing the principles and methods of transforming an intelligible message into one that is unintelligible and then retransforming that message back to its original form. Secure transmission of the information to the genuine recipient has become a Herculean task .This paper presents a novel encryption scheme using Braiding/Entanglement of Pauli Spin 5/2 matrices."Item Secure cryptosystem based on braiding/entanglement of pauli 3/2 matrices(International Journal of Computer Applications, 2016-06) Sravana Kumar, D.; Sirisha, P.; Suneetha, Ch.As the internet is the basic means of communication nowadays,secure transmission of the sensitive information to the genuine recipient has become a Herculean task. Cryptography is an essential tool for protecting information in computer systems. This paper presents a novel encryption scheme using Braiding/Entanglement of Pauli Spin 3/2 matrices.Item Cascade block cipher using braiding / entanglement of spain matrices and bit rotation(International Journal of Network Security & Its Applications, 2016-03) Sravana Kumar, D.; Sirisha, P.; Suneetha, Ch.Secure communication of the sensitive information in disguised form to the genuine recipient so that an intended recipient alone can remove the disguise and recover the original message is the essence of Cryptography. Encrypting the message two or more times with different encryption techniques and with different keys increases the security levels than the single encryption. A cascade cipher is stronger than the first component. This paper presents multiple encryption schemes using different encryption techniques Braiding/Entanglement of Pauli Spin 3/2 matrices and Rotation of the bits with independent secret keys.Item Symmetric stream cipher based on chebyshev polynomial(International Journal Of Engineering And Computer Science, 2017) Sravana Kumar, D.; Sirisha, P.; Suneetha, Ch.The rapid development of information technology turned internet as the basic means and wide choice for communications. Due to extensive adoption of internet for communications it is essential these days to conceal the message from unintended reader. The present paper describes a new encryption algorithm using Chebyshev polynomial of I kind. The plain text is encrypted in three rounds each round consisting of two stages with the concatenation of the previous cipher character with different keys. For making the algorithm more secure the key for the first round of encryption is generated from the main key (agreed upon by the sender and the receiver) and the subsequent round keys are concatenated with the previous round keys. The stream cipher proposed here has several advantages over conventional cryptosystems.