Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sharma, Monisha
- Generation of Quasigroup for Cryptographic Application
Abstract Views :393 |
PDF Views:91
Authors
Affiliations
1 Shri Shankaracharya College of Engineering & Technology, Bhilai, (CG), IN
2 Bhilai Institute of Technology, Durg (CG), IN
1 Shri Shankaracharya College of Engineering & Technology, Bhilai, (CG), IN
2 Bhilai Institute of Technology, Durg (CG), IN
Source
Indian Journal of Science and Technology, Vol 2, No 11 (2009), Pagination: 35-36Abstract
A method of generating a practically unlimited number of quasigroups of a (theoretically) arbitrary order using the computer algebra system Maple 7 is presented. This problem is crucial to cryptography and its solution permits to implement practical quasigroup-based endomorphic cryptosystems. The order of a quasigroup usually equals the number of characters of the alphabet used for recording both the plaintext and the cipher text. Moreover, it can be used for varied information viz. text, image, etc. Many of the on going algorithms uses NLFSR to generate pseudo random sequence and thus the suggested method can be integrated in any of the existing pseudo random sequence to further enhance their complexity. The implementation of PRSG using quasi group processing is highly scalable and fairly unpredictable. It has passed all publicly available random sequence generator tests. That is exactly what this paper provides: fast and easy ways of generating quasigroups of order up to 256 and a little more.Keywords
Quasigroup, Cryptography, Pseudo Random Sequence Generator (PRSG's), QPRSG, Non Linear Feedback Shift Register (NLFSR)References
- Brotherton-Ratcliffe R (April 1995, December 1994) Using quasi-random sequences in Monte-Carlo valuation of pathdependent options. Canadian Treasurer. 11 (2), 36-38.
- Dimitrova V and Markovski J (2003) On quasigroup pseudo random sequence generators, Instt. of Info. Faculty of Natural Sci. & Maths, Ss. Cyril & Methodius Univ., Arhimedova 5, Macedonia.
- Gligoroski D, Markovski S and Knapskog L (2005) A fix of the MD4 family of Hash functions - quasigroup fold. NIST Cryptographic Hash Workshop. 31 Oct-1 Nov.
- Gligoroski D, Markovski S, Kocarev L and Edon-R (2009) An infinite family of cryptographic Hash functions. Intl. J. Network Security. 8 (3), 293-300.
- Gutmann P (2001) Random number generation. Available at http://www.cypherpunks.to/~peter/06 _random.pdf
- Markovski S and Gligoroski D (2003) Differential cryptanalysis of the quasigroup cipher. Univ. of Kuopio, Finland, Ss Cyril & Methodius Univ., Republic of Macedonia.
- Markovski S and Gligoroski D (2007) Construction of quasi groups of huge order. Ss Cyril & Methodius University Skopje, Macedonia, ICDMA7. June-17-20.
- Menezes AJ, van Oorschot PC and Vanstone SA (2001) Handbook of applied cryptography. CRC Press, Canada.
- Navin Rajpal, Anil Kumar, Sureka Dudhani and Pravesh Raja Jindal (2002) Copyright protection using non-linear forward feedback shift register and error-correction technique. In: Map India Conference, Taj Palace New Delhi,India, Feb 6-8
- Ritter Terry (1991) The efficient generation of cryptographic confusion sequences. Cryptologia. l XV (2), 81-139.
- Tony Warnock (1987) Random-number generators. Los Alamos Sci. Special issue, Vol 1, issue 1.
- Implementation and Analysis of Various Symmetric Cryptosystems
Abstract Views :502 |
PDF Views:147
Authors
Affiliations
1 E & Tc. Department, SSCET, Bhilai-490020, Chhattisgarh, IN
1 E & Tc. Department, SSCET, Bhilai-490020, Chhattisgarh, IN
Source
Indian Journal of Science and Technology, Vol 3, No 12 (2010), Pagination: 1173-1176Abstract
This paper implements some of the widely used symmetric encryption techniques i.e. data encryption standard (DES), triple data encryption standard (3DES), advanced encryption standard (AES), BLOWFISH and RC4 in MATLAB software. After the implementation, these techniques are compared on some points. These points are avalanche effect due to one bit variation in plaintext keeping the key constant, avalanche effect due to one bit variation in key keeping the plaintext constant, memory required for implementation and simulation time required for different message lengths.Keywords
DES, 3DES, AES, Blowfish, RC4, Encryption, Decryption, Ciphertext, Deciphertext, PlaintextReferences
- Brian A. Carter, Ari Kassin and Tanja Magoc (2007) Symmetric cryptosystems and symmetric key management. CiteSeerX. 10.1.1.135.1231.
- Grover D (1998) Forensic copyright protection. The computer Law & Security Report, 14, 121–122.
- Pratap R (2004) Getting started with MATLAB, 6. Oxford University Press.
- Schneier B (1993) Description of a new variablelength key, 64-bit block Cipher (Blowfish), Springer- Verlag, 191-204.
- Schweighofer E (1997) Downloading information filtering and copyright. Info. & Commun. Technol. Law, 6 (2) 121-135.