{"title":"使用逆代换的密码术&带种子传播的密钥旋转","authors":"R. K. Pathak, S. Meena","doi":"10.1109/ICCIC.2015.7435730","DOIUrl":null,"url":null,"abstract":"This paper has been proposed for secure communication of data over wired and wireless channel with development of simple algorithm and easiness in its implementation. These features have been enabled using key rotation, inverse substitution and seed values propagation. The algorithm used in this paper can utilize both types of key that is symmetrical and asymmetrical key depending on small modification in arithmetical and logical expressions of encryption algorithm at transmitter end and also decryption algorithms at receiver end. So, algorithm is flexible with respect to key selection.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Cryptography using inverse substitution & key rotation with seed propagation\",\"authors\":\"R. K. Pathak, S. Meena\",\"doi\":\"10.1109/ICCIC.2015.7435730\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper has been proposed for secure communication of data over wired and wireless channel with development of simple algorithm and easiness in its implementation. These features have been enabled using key rotation, inverse substitution and seed values propagation. The algorithm used in this paper can utilize both types of key that is symmetrical and asymmetrical key depending on small modification in arithmetical and logical expressions of encryption algorithm at transmitter end and also decryption algorithms at receiver end. So, algorithm is flexible with respect to key selection.\",\"PeriodicalId\":276894,\"journal\":{\"name\":\"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIC.2015.7435730\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIC.2015.7435730","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptography using inverse substitution & key rotation with seed propagation
This paper has been proposed for secure communication of data over wired and wireless channel with development of simple algorithm and easiness in its implementation. These features have been enabled using key rotation, inverse substitution and seed values propagation. The algorithm used in this paper can utilize both types of key that is symmetrical and asymmetrical key depending on small modification in arithmetical and logical expressions of encryption algorithm at transmitter end and also decryption algorithms at receiver end. So, algorithm is flexible with respect to key selection.