ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

DEDD Symmetric-Key Cryptosystem

Journal: International Journal of Advanced Computer Research (IJACR) (Vol.3, No. 8)

Publication Date:

Authors : ;

Page : 171-176

Keywords : Double Encryption and Decryptio n; Symmetric - key cryptosystem; Cipher; Key generation;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Now a days the greatest challenge to the cyber world is security. We need more and more security for our unsecured systems because technology is not a constant factor. There are lots of catalysts, can break the security sys te m. Day by day number of hackers is being increased. Existing old methods of security often fails to overcome it. But as an ancient quote says it’s true that “Old is Gold”, those methods help us to develop a new idea to sort out our problem in situ thus lea ds us to discover a new horizon . In this paper an attempt has been made to focus on an algorithm of cryptography that was made by using old methodologies . DEDD symmetric - key cryptosystem is the new approach to symmetric key algorithm. By this method we can doubly encrypt and doubly decrypt the message. It means the sender will generate the cipher text from the pla in text twice. The receiver will also have to decrypt the ciphers for two times and then the communication between them will be completed. F or gen erating the key , we will take the message length in first en cryption and in second encryption we will apply shifting technique on a method inte grate_expo which calculates the value of e^integration (m^k dm) from limit m=0 to limit m=m1(message length) whe re e=exponential, m=variable. Double d e - cryption will be done by the reverse process of encryption techniques. There are lots of algorithms for symmetric key cryptography like DES, AES, BLOWFISH, and HMAC - MD5 etc .

Last modified: 2013-04-02 18:34:36