2010 International Conference on Networking and Information Technology 2010
DOI: 10.1109/icnit.2010.5508497
|View full text |Cite
|
Sign up to set email alerts
|

Selective encryption technique in RSA based singular cubic curve with AVK for text based documents: Enhancement of Koyama approach

Abstract: This paper analyzes application of Selective Encryption with Automatic Variable Key (AVK) for text based documents in Koyama Public Key Cryptosystem (PKC). In this paper, a new robust and simple PKC based singular cubic curve cryptosystem over the ring Zn, using selective encryption with Automatic Variable Key (AVK), is proposed. In the proposed algorithm, selected parts of text document are encrypted/decrypted using any public key cryptosystem e.g. RSA algorithm based singular cubic curve with A VK approach. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
1
1
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The module we propose is designed to maintain the best levels of privacy as discussed in Section 2.2 of Chapter 2, but also to improve on existing data security as well as efficiency by using selective encryption [SS10b], [Bhu06], [VFJ + 10] based on appropriate asymmetric and symmetric encryption techniques. The privacy preserving techniques employed are Salt Generation, Random ID and Random Grouping along with symmetric encryption.…”
Section: Our Proposed First Module Of Architecture: Privacy and Security Modelmentioning
confidence: 99%
“…The module we propose is designed to maintain the best levels of privacy as discussed in Section 2.2 of Chapter 2, but also to improve on existing data security as well as efficiency by using selective encryption [SS10b], [Bhu06], [VFJ + 10] based on appropriate asymmetric and symmetric encryption techniques. The privacy preserving techniques employed are Salt Generation, Random ID and Random Grouping along with symmetric encryption.…”
Section: Our Proposed First Module Of Architecture: Privacy and Security Modelmentioning
confidence: 99%
“…The architecture we propose in this paper is designed to maintain the best levels of privacy as discussed in the previous section, but also to improve on existing data security as well as efficiency by using selective encryption [13], [14] based on appropriate asymmetric and symmetric encryption techniques. The privacy-preserving techniques employed are Salt Generation, Random ID and Random Grouping along with symmetric encryption.…”
Section: Proposed Architecturementioning
confidence: 99%