2011 World Congress on Information and Communication Technologies 2011
DOI: 10.1109/wict.2011.6141419
|View full text |Cite
|
Sign up to set email alerts
|

An integrated symmetric key cryptography algorithm using Generalised Modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…the most merits of our subject include: (1) there cravings no confirmation, passwords or shared keys table inside the reliable server; (2) clients will openly settle on and adjust their own passwords; (3) the correspondence and calculation esteem is to a great degree low; (4) Two clients will prove each other by the dependable server; (5) it produces a session enter in assertion between two clients; (6) it's a noncebased topic that doesn't have an overwhelming time synchronization disadvantage. [20][21] …”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…the most merits of our subject include: (1) there cravings no confirmation, passwords or shared keys table inside the reliable server; (2) clients will openly settle on and adjust their own passwords; (3) the correspondence and calculation esteem is to a great degree low; (4) Two clients will prove each other by the dependable server; (5) it produces a session enter in assertion between two clients; (6) it's a noncebased topic that doesn't have an overwhelming time synchronization disadvantage. [20][21] …”
Section: Related Workmentioning
confidence: 99%
“…All the primary focuses are acquainted in with the procedure thus split into two offers. [1][2] Each individual share is keep in customer and server viewpoint.…”
Section: Introductionmentioning
confidence: 99%
“…All operations are XORs and additions on 32-bit words. The Key [20] is converted from 448 bits to several sub-key arrays totaling 4168 bytes. The keys are generated before data encryption or decryption.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%
“…Reference [15] proposed a method that combines NJJSSA algorithm with MSA method in random order. Modified Generalized Vernam Cipher and DJSA method which is an extension of MSA method [12] was combined to DJMNA symmetric key algorithm [14].…”
Section: Introductionmentioning
confidence: 99%