2017
DOI: 10.5815/ijmsc.2017.01.04
|View full text |Cite
|
Sign up to set email alerts
|

Modified DES using Different Keystreams Based On Primitive Pythagorean Triples

Abstract: Symmetric-key encryption is a traditional form of cryptography, in which a single key is used to encrypt and decrypt a message. In symmetric-key algorithm before any encrypted message is being transmitted, the sender and receiver must know the key value in advance. There are several drawbacks in symmetric-key algorithms. In some algorithms, the size of the key should be same as the size of the original plaintext and maintaining and remembering such a key is very difficult. Further, in symmetric-key algorithms,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Here the data searching time is minimized because of which the users can pay less money for using the cloud services [27] Primitive Pythagorean triplets, data encryption standards, hamming distance…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Here the data searching time is minimized because of which the users can pay less money for using the cloud services [27] Primitive Pythagorean triplets, data encryption standards, hamming distance…”
Section: Discussionmentioning
confidence: 99%
“…The data owners are also asked to register before sending any file to the cloud service provider. Mani and Devi [27] tried to enhance the data security by generating different key streams using Pythagorean triplets. Any two positive prime integers are used to find the triplets such that the gcd of the triplets is always 1.…”
Section: Kumaresan and Shanmugammentioning
confidence: 99%
“…Pythagorean triples form different patterns that can be classified and applied in various fields such as cryptography; see [13][14][15][16][17][18][19][20]. For instance, there exist Pythagorean triples ( , , ) that have identical legs; e.g., (20,21,29) and (20,99,101) are two primitive triples with = 20, while (20,15,25) and (20,48,52) are nonprimitive triples with the same leg.…”
Section: Introductionmentioning
confidence: 99%