Kshitij Kala, Akhilesh Dwivedi, Janmejay Pant, Senam Pandey, Vertika Kandpal, R. P. Pant
{"title":"一种基于替代时钟和时间的新手加密技术","authors":"Kshitij Kala, Akhilesh Dwivedi, Janmejay Pant, Senam Pandey, Vertika Kandpal, R. P. Pant","doi":"10.1109/SPIN.2018.8474176","DOIUrl":null,"url":null,"abstract":"In this paper, we have developed an algorithm that proposes advance and novice security mechanism that can defend any kind of attacks and is advantageous over the other existing algorithms that are currently being used in security areas like email and web-based security applications. This algorithm is based on the concept of time in analog clock. The most powerful feature of this algorithm is 10506 (permutation of substitution clock). We implemented this algorithm in python. And after verification and validation we found out that it is impossible to crack by any kind of tool in existence. We are looking forward to use this algorithm in various applications.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Novice Encryption Technique using Substitution Clock and Time in It (SCT)\",\"authors\":\"Kshitij Kala, Akhilesh Dwivedi, Janmejay Pant, Senam Pandey, Vertika Kandpal, R. P. Pant\",\"doi\":\"10.1109/SPIN.2018.8474176\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we have developed an algorithm that proposes advance and novice security mechanism that can defend any kind of attacks and is advantageous over the other existing algorithms that are currently being used in security areas like email and web-based security applications. This algorithm is based on the concept of time in analog clock. The most powerful feature of this algorithm is 10506 (permutation of substitution clock). We implemented this algorithm in python. And after verification and validation we found out that it is impossible to crack by any kind of tool in existence. We are looking forward to use this algorithm in various applications.\",\"PeriodicalId\":184596,\"journal\":{\"name\":\"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SPIN.2018.8474176\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPIN.2018.8474176","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Novice Encryption Technique using Substitution Clock and Time in It (SCT)
In this paper, we have developed an algorithm that proposes advance and novice security mechanism that can defend any kind of attacks and is advantageous over the other existing algorithms that are currently being used in security areas like email and web-based security applications. This algorithm is based on the concept of time in analog clock. The most powerful feature of this algorithm is 10506 (permutation of substitution clock). We implemented this algorithm in python. And after verification and validation we found out that it is impossible to crack by any kind of tool in existence. We are looking forward to use this algorithm in various applications.