AN ENCRYPTION AND AUTHENTICATION ALGORITHM DEVELOPED BASED ON THE ONE – TIME PAD CIPHER
266 viewsKeywords:
Symmetric-key cryptography; Symmetric-key cryptographic algorithm; Symmetric-key cryptosystems; One - time pad algorithm; OTP cipher.Abstract
An encryption and authentication algorithm developed based on the One – Time Pad (OTP) cipher are proposed. Advantages of the new algorithm is to have high safety and efficient implementation as OTP cipher, but the establishment, management - distribution and usage of keys are exactly the same as the Symmetric-key cryptosystems in practice (DES,AES, etc.)
References
[1]. SharadPatil , Ajay Kumar (2010). "Effective Secure Encryption Scheme(One Time Pad) using Complement Approach". International Journal of Computer Science & Communication, Vol.1,No.1,January-June 2010, pp.229-233.
[2]. Raman Kumar,Roma Jindal, Abhinav Gupta , SagarBhalla, HarshitArora (2011). "A Secure Authentication System-Using Enhanced One Time Pad Technique". IJCSNS International Journal of Computer Science and Network Security,VOL.11 No.2,February 2011.
[3]. SharadPatil ,ManojDevare , Ajay Kumar (2007). "Modified One Time Pad Data Security Scheme: Random Key Generation Approach". International Journal of Computer Science and Security (IJCSS) ,Volume (3): Issue(2).
[4]. N.J.Croft and M.S.Olivier (2005). “Using an approximated One-Time Pad to Secure ShortMessaging service(SMS)”. SATNAC 2005 Proceedings.
[5]. Jeff Connelly (1978). "A Practical Implementation of a One-time Pad Cryptosystem". CPE 456 , June 11, 2008.
[6]. Shannon C.E. (1949). "Communication Theory of Secrecy Systems". Bell System Technical Journal, Vol.28-4, pp 656-715.
[7]. William Stallings (2005). "Cryptography and Network Security Principles and Practices". Prentice Hall.
[8]. FIPS PUB 197: "Federal information processing standards publication 197". Category: computer security standard, cryptography. November 2001.
[9]. Menezes A., Van Oorschot P. and Vanstone S. (1996). "Handbook of Applied Cryptography". Boca Raton, Florida: CRC Press.
[10]. D. Coppersmith, H. Krawczyk, and Y. Mansour, “The shrinking generator,” in CRYPTO ’93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology, (New York, NY, USA), pp. 22–39, Springer-Verlag New York, Inc., 1994.