2009 6th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technolog 2009
DOI: 10.1109/ecticon.2009.5137170
|View full text |Cite
|
Sign up to set email alerts
|

Accelerating asymmetric-key cryptography using Parallel-key Cryptographic Algorithm (PCA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 5 publications
0
10
0
Order By: Relevance
“…Here, we generate a random pattern whenever the PCA module is called. The pattern determines the order in which the blocks of data will be encrypted and decrypted -major and minor key [1]. It is this randomness which provides the enhanced protection and edge to PCA when compared to other algorithms.…”
Section: Random Patternmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, we generate a random pattern whenever the PCA module is called. The pattern determines the order in which the blocks of data will be encrypted and decrypted -major and minor key [1]. It is this randomness which provides the enhanced protection and edge to PCA when compared to other algorithms.…”
Section: Random Patternmentioning
confidence: 99%
“…Symmetric cryptography and Asymmetric cryptography are the two mechanisms of cryptography [1]- [9]. Parallel Key encryption is classified under the Asymmetric type as it makes use of two separate keys for encryption and decryption.…”
Section: Introductionmentioning
confidence: 99%
“…These complex algorithms cause delay to real time application. Public key algorithms not suitable for large mount of data due its slow performance [2][3].…”
Section: Introductionmentioning
confidence: 99%
“…A large number of keys needs to be maintained in a large group. In contrast, the number of keys which needs to be maintained in a group is only 2n in asymmetric-key cryptography 2 . Among other existing asymmetric algorithms, the RSA algorithm is the most practical public key system 4 in use yet 5,6 because of its security and easy implementation.…”
Section: Introductionmentioning
confidence: 99%
“…Public key was invented mostly to solve the certain problem of secret key distribution 1,2 . While all of the application data transferred throughout the networking environments is ciphered with a secret key, secret key distribution is a tough job.…”
Section: Introductionmentioning
confidence: 99%