Study and Analysis of a New Data Encryption Technique Using Special Symbols Shifting
Abstract
Keywords
Full Text:
PDFReferences
Serge Vaudenay, Ecole Normale Superieure-CNRC,”On the security of CS-Cipher” sarge.vaudenay@ens.fr.
“Comparision based Analysis of Different Cryptographic and Encryption Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)”, IJCSI, VOL. 9.Issue, No.2, January 2012, ISSN (online):1694-0814.
H.Agrawal, M.Sharma, E & Tc. Department, SSCET, Bhilai-490020, Chattisgarh, India, “Implementation and analysis of various symmetric cryptanalysis”.
Dr. A.J. An Wang, IT 6823:Graduate Student Research Paper PASSIVE ATTACK AGAINST COMPUTER NETWORKS, PATRI GARBIN IT 6823-Information, Spring 2004.
S.G. Srinkantaswamy, Prof.H.D. Phaneendra, International Journal of Computer Application (0975-8887), Vol. 29-No.8,September 2011.
Cryptology & physical and Physical Security: Rights Amplification in Master – Keyed Mechanical Locks, Mall Blaze AT&T Labs-Research,mab@crypto.com,mab@reaearch.att.com
M. Dworkin, recommendation for Block Cipher Modes of Operation, Methods & Techniques, NIST (National Institute of Standards & Technology Administration U.S. Department of Commerce).
A. Kahate , “Cryptography and Network Security”, published by Tata McGraw Hill Education Ltd., ISBN:0-07-064823-9, 2008.
Wikipedia on cipher techniques, http://en.wikipedia.org/wiki/Cipher.
M.J.Justin and S. Manimurugan, “ A Survey on Various Encryption Techniques”, International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-2, Issue-1, March 2012.
V. Umakanta Sastry, N. Ravi Shankar, and S. Durga Bhavani, “A Modified Playfair Cipher for a Large Block of Plaintext”, International Journal of Computer Theory and Engineering, Vol. 1, No. 5, December 2009.
V. Radhakrishnan and Dr. S. Venkatachalam, “Novel information security model using proposed e-cipher method with combining the features of cryptic-steganography”, IJCSI International Journal of Computer Science Issues, ISSN (Online): 1694-0814, Vol. 8, Issue 5, No 2, September 2011.
V.V.Yaschenko, “Cryptography: An Introduction”, ISBN: 0-8218-2986-6.
G.A.Apparao, R. Bhadri, P.Reddy and V. Vardhan, “Decipherment of Substitution cipher Using Enhanced Probability Distribution”, International Journal of Computer Application (IJCA), No.8, 2010.
Piper, Fred and S. Murphy, “Cryptography : A Very Short Introduction”, ISBN 0-19-280315-8.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.