2013
DOI: 10.1007/s40031-013-0066-8
|View full text |Cite
|
Sign up to set email alerts
|

Generation of Automatic Variable Key under Various Approaches in Cryptography System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
6
3
1

Relationship

2
8

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…In [17] Association rules for variability of key using parameterized approach have been constructed for prediction of future parameters for construction of key from hacker's perspectives. In [18], the cryptic algorithm developed from Fibonacci-Q matrix [10,14,15] under various situations say hacker is interested to mine future keys, future key sequences, and probable steady state situation using Markov process. The stochastic analysis and future recommendations for ensuring security is presented in [18,20].…”
Section: Related Work For Avk Cryptosystemmentioning
confidence: 99%
“…In [17] Association rules for variability of key using parameterized approach have been constructed for prediction of future parameters for construction of key from hacker's perspectives. In [18], the cryptic algorithm developed from Fibonacci-Q matrix [10,14,15] under various situations say hacker is interested to mine future keys, future key sequences, and probable steady state situation using Markov process. The stochastic analysis and future recommendations for ensuring security is presented in [18,20].…”
Section: Related Work For Avk Cryptosystemmentioning
confidence: 99%
“…Bhunia [5][6][7] proposed the Automatic Variable Key technique for practical approaches of security in the year 2006. There are many researchers like Goswami [10][11][12][13][14][15][16][17], Banerjee and Dutta et al [8][9] invented more secure techniques based on Automatic Variable Key (AVK) by increasing the randomness, standard deviation and root mean square among the auto generated key sequences. The aim of our techniques is to secure the key from unauthorized persons and tom hide the secret keys from others and to generate more random keys as compared to the existing key generation techniques.…”
Section: Introductionmentioning
confidence: 99%
“…The pioneer work of Bhunia [3][4][5] in implementing the Shannon"s theorem for realization of variable key for variable data / session is well researched [6][7][8][9][10][11][12][13][14][15][16]. The documented research findings used the simple technique of realizing Automatic Variable Key (AVK) as originally proposed by Bhunia.…”
Section: Introductionmentioning
confidence: 99%