Symmetric key cryptosystem using combined cryptographic algorithms - Generalized modified Vernam Cipher method, MSA method and NJJSAA method: TTJSA algorithm
In the present paper the authors have introduced a new combined cryptographic method called TTJSA. Nath et al. have already developed some symmetric key methods. In the present work the authors have used two methods MSA and NJJSAA which were developed by Nath et al. and have developed a new algorith...
Saved in:
Published in | 2011 World Congress on Information and Communication Technologies pp. 1175 - 1180 |
---|---|
Main Authors | , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2011
|
Subjects | |
Online Access | Get full text |
ISBN | 1467301272 9781467301275 |
DOI | 10.1109/WICT.2011.6141415 |
Cover
Abstract | In the present paper the authors have introduced a new combined cryptographic method called TTJSA. Nath et al. have already developed some symmetric key methods. In the present work the authors have used two methods MSA and NJJSAA which were developed by Nath et al. and have developed a new algorithm, generalized modified Vernam Cipher Method. The above three methods are applied in random order on any given plain text for a number of times to get the ultimate cipher text file. In the present work, authors modified the standard Vernam Cipher Method for all characters (ASCII code 0-255) with randomized keypad, and have also introduced a feedback mechanism. The method has been closely monitored on different known plain text and it was found that this method is almost unbreakable. The present method allows multiple encryption/decryption. The present method is an extremely secure block cipher method and it can be applied to encrypt data in Defense system, Banking sector, mobile network etc. The advantage of the present method is that one can apply this method on top of any other standard algorithm such as DES, AES or RSA. The method is suitable to encrypt any type of file. |
---|---|
AbstractList | In the present paper the authors have introduced a new combined cryptographic method called TTJSA. Nath et al. have already developed some symmetric key methods. In the present work the authors have used two methods MSA and NJJSAA which were developed by Nath et al. and have developed a new algorithm, generalized modified Vernam Cipher Method. The above three methods are applied in random order on any given plain text for a number of times to get the ultimate cipher text file. In the present work, authors modified the standard Vernam Cipher Method for all characters (ASCII code 0-255) with randomized keypad, and have also introduced a feedback mechanism. The method has been closely monitored on different known plain text and it was found that this method is almost unbreakable. The present method allows multiple encryption/decryption. The present method is an extremely secure block cipher method and it can be applied to encrypt data in Defense system, Banking sector, mobile network etc. The advantage of the present method is that one can apply this method on top of any other standard algorithm such as DES, AES or RSA. The method is suitable to encrypt any type of file. |
Author | Nath, A. Dey, S. Das, T. Chatterjee, T. Nath, J. |
Author_xml | – sequence: 1 givenname: T. surname: Chatterjee fullname: Chatterjee, T. email: trishachatteriee2009@gmail.com organization: Dept. of Comput. Sci., St. Xavier's Coll., Kolkata, India – sequence: 2 givenname: T. surname: Das fullname: Das, T. email: tamodeep1@yahoo.co.in organization: Dept. of Comput. Sci., St. Xavier's Coll., Kolkata, India – sequence: 3 givenname: S. surname: Dey fullname: Dey, S. email: shayandey8191@gmail.com organization: Dept. of Comput. Sci., St. Xavier's Coll., Kolkata, India – sequence: 4 givenname: A. surname: Nath fullname: Nath, A. email: asokejoy1@gmail.com organization: Dept. of Comput. Sci., St. Xavier's Coll., Kolkata, India – sequence: 5 givenname: J. surname: Nath fullname: Nath, J. email: joyshreenath@gmail.com organization: A.K.Chaudhuri Sch. of IT, Calcutta Univ., Kolkata, India |
BookMark | eNpFUMFOwzAMDQIk2NgHIC75AFqSNk1ablMFY9OAwyo4TmnjrYGlrZJyKP_CvxKJTtgHv2c_PcueoLOmbQCha0pCSkl2977MizAilIacMp_JCZplIqWMi5jQiKenaHIkIrpAM-c-iA_Os4hFl-hnMxgDvdUV_oQBV3bo-tYNrgeDv5xu9rhqTakbUONsb2VXe7U87Fur-9o4HOAFNGDlQX97mWmV3mkP3sA20uBcdzVY7JfUrbrFz5v5iLFsFH5ZrTbzY-ceF4Wn_95X6HwnDw5mY52i4vGhyJ-C9etimc_Xgc5IH1CRxGRXijLxl6eRYEKomFc8VpCxFErJPKNQ8kxIGSfKf6tijAlKM5oIouIpuvmz1QCw7aw20g7b8aHxL8rAbHY |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/WICT.2011.6141415 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) (UW System Shared) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781467301268 9781467301251 1467301264 1467301256 |
EndPage | 1180 |
ExternalDocumentID | 6141415 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i90t-17530fb7b5978827477d36c63de948eba436c1eb697aa35d011c44471191570d3 |
IEDL.DBID | RIE |
ISBN | 1467301272 9781467301275 |
IngestDate | Wed Aug 27 04:14:19 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-17530fb7b5978827477d36c63de948eba436c1eb697aa35d011c44471191570d3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_6141415 |
PublicationCentury | 2000 |
PublicationDate | 2011-Dec. |
PublicationDateYYYYMMDD | 2011-12-01 |
PublicationDate_xml | – month: 12 year: 2011 text: 2011-Dec. |
PublicationDecade | 2010 |
PublicationTitle | 2011 World Congress on Information and Communication Technologies |
PublicationTitleAbbrev | WICT |
PublicationYear | 2011 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000669242 |
Score | 1.5411773 |
Snippet | In the present paper the authors have introduced a new combined cryptographic method called TTJSA. Nath et al. have already developed some symmetric key... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1175 |
SubjectTerms | Computer hacking Decryption Educational institutions Encryption Feedback Left Shift Mobile communication Public key cryptography Right Shift |
Title | Symmetric key cryptosystem using combined cryptographic algorithms - Generalized modified Vernam Cipher method, MSA method and NJJSAA method: TTJSA algorithm |
URI | https://ieeexplore.ieee.org/document/6141415 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG-Qkyc1YPxODx4ZbG23MW-ESJAEYsJUbmT9GC66jeA4yP_i_-prNyAaD9762qZpXt72Pvre7yF0q50KoRzPkixiFgtEDP_BgFsgTCSQwo2I6Tw3nnjDJzaaubMaau1qYZRSJvlMtfXQvOXLXKx1qKwDqsQxFeUHIGZlrdYungKqE1wJYmq3PC22xCdbSKeKdqtXTccOOi8P_bAE8KwO_dFdxSiXwREab69V5pS8tdcFb4vNL8TG_977GDX3ZXz4caegTlBNZQ30Nf1MU91GS2D4frFYfS6LvMRzxjoJfoFBBsFdVrJaM5DWsDt6X-SrpHhNP7CFK7TqZAPb0lwmMViy-FnHFlPcTzRUAS57U7fweNqrxjjKJJ6MRtPeduYOhyGQ-7ObKBzch_2hVfVosJLALiyN82nH3Ofgl4CtDr6JL6knPCpVwLqKRwwoR3Ev8KOIuhIYLhgDhQhuouvbkp6iepZn6gxhwgNqSweOEg4jsexK4vsR5ZT6hEpXnKOG5ux8WaJwzCumXvw9fYkOTfTXJJ5coXqxWqtrMB8KfmPk5hu9p8Fu |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELYqGGACVBBvPDA2bWI7CWGrKlBbmgqpAbpV8SMQQRJU0gH-C_-Vs5MWgRjYfLZlWadL7uG77xA6106FUI5nSRYziwUigf9gwC0QJhJI4cbEdJ4Lx17_jg2n7rSBWqtaGKWUST5TbT00b_myEAsdKuuAKnFMRfk66H3mVtVaq4gKKE9wJoip3vK04BKfLEGdatqt3zUdO-g8DHpRBeFZH_ujv4pRL9dbKFxerMoqeW4vSt4WH78wG_978220-13Ih29XKmoHNVTeRJ-T9yzTjbQEhi8Yi_n7a1lUiM5Yp8E_YpBCcJiVrNcMqDXsjl8ei3laPmVv2MI1XnX6AduyQqYJ2LL4XkcXM9xLNVgBrrpTt3A46dZjHOcSj4fDSXc5c4mjCMjvs3dRdH0V9fpW3aXBSgO7tDTSp51wn4NnAtY6eCe-pJ7wqFQBu1A8ZkA5inuBH8fUlcBwwRioRHAUXd-WdA-t5UWu9hEmPKC2dOAo4TCSyAtJfD-mnFKfUOmKA9TUnJ29Vjgcs5qph39Pn6GNfhSOZqPB-OYIbZpYsElDOUZr5XyhTsCYKPmpkaEvDCvEuw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+World+Congress+on+Information+and+Communication+Technologies&rft.atitle=Symmetric+key+cryptosystem+using+combined+cryptographic+algorithms+-+Generalized+modified+Vernam+Cipher+method%2C+MSA+method+and+NJJSAA+method%3A+TTJSA+algorithm&rft.au=Chatterjee%2C+T.&rft.au=Das%2C+T.&rft.au=Dey%2C+S.&rft.au=Nath%2C+A.&rft.date=2011-12-01&rft.pub=IEEE&rft.isbn=9781467301275&rft.spage=1175&rft.epage=1180&rft_id=info:doi/10.1109%2FWICT.2011.6141415&rft.externalDocID=6141415 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467301275/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467301275/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467301275/sc.gif&client=summon&freeimage=true |