Skip to main content
Log in

Generation of Automatic Variable Key under Various Approaches in Cryptography System

  • Original Contribution
  • Published:
Journal of The Institution of Engineers (India): Series B Aims and scope Submit manuscript

Abstract

One of the finest approach for achieving the perfect security is the time variant key or variable key from session to session or to data. Automatic Variable Key (AVK) is a novel approach in respect of time variant key technique. In AVK, the key is generated by a variable data transmitted in prior session. The AVK was widely experimented by many researchers and the superiority of AVK over a single key/fixed key has been duly established. In this paper few new techniques to generate time variant key is proposed. Comparison to find out the superiority of different key generation techniques is also made.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. C. E. Shannon, Mathematical theory of communication, Bell Syst Tech J, 27, 379–423, 623–656 (1984)

  2. C.E. Shannon, Communication theory of secrecy system, Bell Syst Tech J, 28, 656–715 (1949)

    Google Scholar 

  3. C.T. Bhunia, G. Mondal, S. Samaddar, Theory and application of time variant key in RSA and that with selective encryption in AES (Indian Engineering Congress, Kolkata, 2006)

  4. C.T. Bhunia, New approaches for selective AES towards tackling error propagation effect of AES, Asian J Inf Technol, 5990, 1017–1022 (2006)

    Google Scholar 

  5. P. Chakrabarti, B. Bhuyan, A. Chowdhuri, C.T. Bhunia, A novel approach towards realizing optimum data transfer and automatic variable key (AVK), Int J Comp Sci Netw Secur, 8(5), 241 (2008)

    Google Scholar 

  6. C. Konar, C.T. Bhunia, A novel approach towards realizing optimum data transfer and AVK in cryptography, Int J Comp Sci Netw Secur, 8(5), 241–250 (2008)

    Google Scholar 

  7. C.T. Bhunia, New approaches for selective AES towards trackling error propagation effect of AES, Asian J Inf Technol Pak, 5(9), 1017–1022 (2006)

    Google Scholar 

  8. B. Bhuyan, P. Chakraborti, A. Chowdhuri, F. Masulli, C.T. Bhunia, Implementation of automatic variable key with choas theory and studied thereof, JIUP Comp Sci, 5(4), 22–32 (2011)

    Google Scholar 

  9. C.T. Bhunia, G. Mondal, S. Samaddar, Theories and application of time variant key in RSA and that with selective encryption in AES, Proc. EAIT (Elsevier, Calcutta, 2006), 219–221

  10. P. Chakrabarti, B. Bhuyan, A. Chowdhuri, C.T. Bhunia, A novel approach towards realizing optimum data transfer and AVK in cryptography, Int J Comp Sci Netw Secur Korea, 8(5), 241–250 (2008)

    Google Scholar 

  11. C.T. Bhunia, Information technology, network and internet, New Age publication

  12. C.T. Bhunia, S.K. Chakraborty, R.S. Goswami, A new technique (CSAVK) of automatic variable key in achieving perfect security, Poster 100th Indian Science Congress Association, (2013)

  13. R.S. Goswami, S.K. Chakraborty, A. Bhunia, C.T. Bhunia, New techniques for generating of automatic variable key in achieving perfect security, Commun J Inst Eng India

  14. R.S. Goswami, S.K. Chakraborty, A. Bhunia, C.T. Bhunia, New approach towards generation of automatic variable key to achieve perfect security, ITNG, IEEE Comp Soc, CPS, USA, Las Vegas, 489–491 (2013)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. S. Goswami.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Goswami, R.S., Chakraborty, S.K., Bhunia, A. et al. Generation of Automatic Variable Key under Various Approaches in Cryptography System. J. Inst. Eng. India Ser. B 94, 215–220 (2013). https://doi.org/10.1007/s40031-013-0066-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40031-013-0066-8

Keywords

Navigation