2015
DOI: 10.1007/978-3-319-21413-9_12
|View full text |Cite
|
Sign up to set email alerts
|

Markov Analysis of AVK Approach of Symmetric Key Based Cryptosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…With the development of multi another approach of advancement in cryptography is Automatic variable key approach, the cipher generated from this approach are through dynamic keys that keeps changing from session to session. some variety of techniques(such as Fibonacci Q and Sparse Matrix) and it's analysis from hackers and cryptanalyst perspective is available in [8,10,14,16,18].from the perspective of Cryptic mining, The clustering and classification of ciphers is to be investigated from ANN,BBN and its variants.…”
Section: Background For Cryptanalysismentioning
confidence: 99%
See 2 more Smart Citations
“…With the development of multi another approach of advancement in cryptography is Automatic variable key approach, the cipher generated from this approach are through dynamic keys that keeps changing from session to session. some variety of techniques(such as Fibonacci Q and Sparse Matrix) and it's analysis from hackers and cryptanalyst perspective is available in [8,10,14,16,18].from the perspective of Cryptic mining, The clustering and classification of ciphers is to be investigated from ANN,BBN and its variants.…”
Section: Background For Cryptanalysismentioning
confidence: 99%
“…In [17] Association rules for variability of key using parameterized approach have been constructed for prediction of future parameters for construction of key from hacker's perspectives. In [18], the cryptic algorithm developed from Fibonacci-Q matrix [10,14,15] under various situations say hacker is interested to mine future keys, future key sequences, and probable steady state situation using Markov process. The stochastic analysis and future recommendations for ensuring security is presented in [18,20].…”
Section: Related Work For Avk Cryptosystemmentioning
confidence: 99%
See 1 more Smart Citation
“…Association Rule: These set of algorithm investigates rules for associating parameters based relationships together with (plain-text,cipher-text) paired associations. [48,49] Pattern discovery: These set of algorithm works as scanners and input them to high-end analysis tools like Markov model [48], ANN, GA, ACO etc. These cryptic mining techniques finds applications in detecting behavior of malware, ad-ware analysis, classes of attacks using honey-pot and honey-net systems.…”
Section: Background For Cryptanalysismentioning
confidence: 99%
“…But in literature there are ciphers being generated through keys of short-fixed-length keys [12,13] varying with session to sessions. Ciphers generated through these AVK mechanism [14,15] are to be converted back into plain text.…”
Section: Review Of Literaturementioning
confidence: 99%