Skip to main content

2016 | OriginalPaper | Buchkapitel

SKT: A New Approach for Secure Key Transmission Using MGPISXFS

verfasst von : Kamal Kumar Gola, Vaibhav Sharma, Rahul Rathore

Erschienen in: Information Systems Design and Intelligent Applications

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cryptography is the concept used to enhance secure communication between two parties; these parties can be two persons in same building or two persons in different organizations of the world. Cryptography is said to be 100 % secure but every time attacker try to break the magic of cryptography. One loose point in cryptography is key transmission. It is most sensitive transmission in the field of cryptography. Many Techniques are proposed time to time to secure key transmission. Some techniques have shown good result up to some extent but not at all fully secured. In this paper we have proposed a key transmission technique to enhance security, Confidentiality and Integrity. We have described detailed algorithm to perform key transmission. Also we have compared the proposed algorithm with existing algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Prashanti. G, Deepthi. S, Sandhya Rani. K, “A Novel Approach for Data Encryption Standard Algorithm”, International Journal of Engineering and Advanced Technology (IJEAT), Volume-2, Issue-5, June 2013. Prashanti. G, Deepthi. S, Sandhya Rani. K, “A Novel Approach for Data Encryption Standard Algorithm”, International Journal of Engineering and Advanced Technology (IJEAT), Volume-2, Issue-5, June 2013.
2.
Zurück zum Zitat T. J. Watson, Don B. Johnson, Stephen M. Matyas, “Triple DES Cipher Block Chaining with Output Feedback Masking on Coppersmith”, IBM Journal of Research and Development, Volume 40, Number 2, 1996 pp. 253–261. T. J. Watson, Don B. Johnson, Stephen M. Matyas, “Triple DES Cipher Block Chaining with Output Feedback Masking on Coppersmith”, IBM Journal of Research and Development, Volume 40, Number 2, 1996 pp. 253–261.
3.
Zurück zum Zitat Ritu Pahal Vikas kumar, “Efficient Implementation of AES”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013. Ritu Pahal Vikas kumar, “Efficient Implementation of AES”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013.
6.
Zurück zum Zitat S.G. Gino Sophia, K. Padmaveni, Linda Joseph, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248–9622 www.ijera.com Vol. 3, Issue 1, January -February 2013, pp.1492–1496 1492. S.G. Gino Sophia, K. Padmaveni, Linda Joseph, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248–9622 www.​ijera.​com Vol. 3, Issue 1, January -February 2013, pp.1492–1496 1492.
7.
Zurück zum Zitat Vaibhav Sharma, Kamal Kumar Gola, Gulista Khan, Rahul Rathore, 2015 Second International Conference on Advances in Computing and Communication Engineering, Key Sharing Technique To Preserve Integrity And Confidentiality, 978-1-4799-1734-1/15 © 2015 IEEE, doi:10.1109/ICACCE.2015.48. Vaibhav Sharma, Kamal Kumar Gola, Gulista Khan, Rahul Rathore, 2015 Second International Conference on Advances in Computing and Communication Engineering, Key Sharing Technique To Preserve Integrity And Confidentiality, 978-1-4799-1734-1/15 © 2015 IEEE, doi:10.​1109/​ICACCE.​2015.​48.
Metadaten
Titel
SKT: A New Approach for Secure Key Transmission Using MGPISXFS
verfasst von
Kamal Kumar Gola
Vaibhav Sharma
Rahul Rathore
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2755-7_61

Premium Partner