Gmdes: a graph based modified data encryption standard algorithm with enhanced security
Debajit Sensarma,Samar Sen Sarma +1 more
TLDR
The algorithm is graph automorphism based partial symmetric key algorithm and it is not fully depended on secret key and produces different cipher text by applying same key on the same plain text.Abstract:
Cryptography is one of the prime techniques of secured symbolic data transmission over any communication channel. Security is the most challenging and essential aspects in today’s internet and network applications. Thus, design of a secure encryption algorithm is very necessary which can protect the unauthorized attacks. An encryption algorithm is computationally secure if it cannot be intruded with the standard resources. The algorithm proposed here is graph based. Its efficiency surpasses the standard DES algorithm in general. Graphs can be used for designing block ciphers, stream ciphers or public-key ciphers. The algorithm is graph automorphism based partial symmetric key algorithm and it is not fully depended on secret key and produces different cipher text by applying same key on the same plain text.read more
Citations
More filters
Journal ArticleDOI
Medical Image Encryption: An Application for Improved Padding Based GGH Encryption Algorithm
TL;DR: Padding GGH approach has improved UACI, NPCR, and Avalanche by almost 100%, 35%, and 45%, respectively, in comparison to the standard GGH algorithm, and increasing the avalanche effect of more than 50% is a promising achievement in relation to the increased complexities of the proposed method in terms of encryption and decryption processes.
Book ChapterDOI
A Vulnerability Analysis Mechanism Utilizing Avalanche Attack Model for Dependency-Based Systems
TL;DR: The results prove that the proposed method is superior than using the uniform search method, and the maximization/minimization problem is successfully solved, as the results locate the desired objectives that support the ingenuity of the proposed model.
Journal ArticleDOI
An Algorithmic Approach for Encryption using Graph Labeling
P. Amudha,J. Jayapriya,J. Gowri +2 more
TL;DR: The suggested algorithmic approach speaks a new encryption technique to encode and decode the message very securely using graph labeling to secure the information.
Journal ArticleDOI
Thermal Comfort Study of a Classroom in Northern Malaysia: A CFD Approach
TL;DR: In this article, a study was conducted to assess the thermal comfort in one of the classrooms of a university located in the northern most part of Malaysia, where the particular classroom was randomly chosen from a total of 4 classrooms of the same size and condition.
Journal Article
Application of Cosmos's law of Merge and Split for Data Encryption
Sanjay Kr. Pal,Nupur Chakraborty +1 more
TL;DR: An encryption technique with time complexity of O(1) that exploits the dynamic node fusion property of graph theory that will be completely able to resist the illicit actions of intruders with low computational efforts as well as it reduces the network load on packet transmission.
References
More filters
Book
The Art of Computer Programming
TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Book
Algebraic Graph Theory
Chris Godsil,Gordon F. Royle +1 more
TL;DR: The Laplacian of a Graph and Cuts and Flows are compared to the Rank Polynomial.
The Art in Computer Programming
Andrew Hunt,Dave Thomas +1 more
TL;DR: Here the authors haven’t even started the project yet, and already they’re forced to answer many questions: what will this thing be named, what directory will it be in, what type of module is it, how should it be compiled, and so on.
Journal Article
The On-Line Encyclopedia of Integer Sequences.
TL;DR: The On-Line Encyclopedia of Integer Sequences (OEIS) as mentioned in this paper is a database of 13,000 number sequences and is freely available on the Web (http://www.att.com/~njas/sequences/) and is widely used.
Book
Cryptography and Network Security: Principles and Practice
TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Related Papers (5)
An Encryption Algorithm for End-to-End Secure Data Transmission in MANET
Rohan Rayarikar,Ajinkya A. Bokil +1 more