To Achieve Higher Security in Automatic Variable Key Technique towards Optimum Data Transfer with Noise Burst in Cryptosystem

  • Moumita Das
  • Rajat Subhra Goswami
  • R. S. Mehta
  • S. K. Chakraborty

Abstract

In this manuscript, we have proposed new key generation techniques with noise burst based on established variable key generation techniques. To verify the true randomness of the proposed techniques, we have tested the randomness of successive generated keys by using National Institute of Standards and Technology (NIST) statistical tool and tested with the standard algorithm RC4 and proved that the generated keys are truly random. The proposed techniques provide maximum level of security as compared to those related existing techniques as the newly generated keys are more random. Due to the enhanced randomness, it can be stated that proposed techniques provide more security in real time applications.

Keywords: Noise Burst, Randomness, Standard Deviation, KVM, LSAVK.

References

[1] C E Shannon, “Communication Theory of Secrecy System”, the Bell System Tech J, 1949.
[2] C E Shannon, "A Mathematical Theory of Communication", Bell System Tech J, 27, 379-423, 623-656, 1948.
[3] M. Diffie, E. Hellman, "Exhaustive Cryptanalysis of the no of bits Data Encryption Standard", Computer, pp.74-84, 1977.
[4] FIPS 140-1, Security Requirements for Cryptographic Modules, Federal Information Processing standards Publication140-1.U.S, department of Commerce /NIST, National Technical Information science, Springfield ,VA, 1994.
[5] Rukin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J & Vo S, A statistical test suite for random and pseudorandom number generators for cryptographic applications(NIST special publication) 2010.
[6] C. T. Bhunia, "New Approach for Selective AES towards Tackling Error Propagation Effect of AE", ASIAN Journal of Information Technology, volume 5990, pp.1017-1022, 2006.
[7] C. T. Bhunia, "Implementation of AVK with Chaos Theory and Studied Thereof", J IUP Computer Science volume V, No 4, pp.22-32, 2011.
[8] M. P. Dutta, S. Banerjee, C .T. Bhunia, "Two New Schemes to Generate Automatic Variable Key to Achieve the Perfect Security in Insecure Communication Channel", In preceding of the International Conference on Advanced Research in Computer Science Engineering &Technology (ICARCSET, Eluru, India), 2015.
[9] Rajat Subhra Goswami, Swarnendu Chakraborty, C. T. Bhunia, Abhinandan Bhunia, "New Approach towards Generation of Automatic Variable Key to Achieve Perfect Security", ITNG, IEEE Computer Society, CPS, USA, Las Vegas, pp.489-491, 2013.
[10] Rajat Subhra Goswami, Swarnendu Chakraborty, C. T. Bhunia, Abhinandan Bhunia, "Generation of Automatic Variable Key under Various Approaches in Cryptography System", J. Institute Engineering, India Ser. B, 94, 4,215-220, 2014.
[11] Rajat Subhra Goswami, Swarnendu Chakraborty, Abhinandan Bhunia, C. T. Bhunia, "New Techniques for Generating of Automatic Variable Key in Achieving Perfect Security", J. Institute Engineering, India Ser. B, 95, 3, 197-201, 2014.
[12] S. Goswami, S. Misra, M. Mukesh, “A PKI Based Time Stamped Secure Signing Tool for e-Documents”, Proceedings of 2014 International Conference on High Performance Computing and Applications (ICHPCA), Bhubaneswar, December 22-24, 2014.
[13] S. Goswami, S. Misra, M. Mukesh, “A replay attach resilient system for PKI based authentication in challenge-response mode for online application”, Proceedings of the 3rd International Conference on Echo-friendly Computing and Communication Systems (ICECCS), Surathkal, Mangalore, India, December 18-21, 2014.
[14] S. Misra, S. Goswami, C. Taneja, A. Mukherjee, M. S. Obaidat, “A PKI Adapted Model for Secure Information Dissemination in Industrial Control and Automation 6LoWPANs”, IEEE Access Journal, Volume 3, pp. 875-889, 2015.
[15] S. Misra, S. Goswami, G. P. Pathak and N. Shah, “Efficient Detection of Public Key Infrastructure-Based Revoked Keys in Mobile Ad Hoc Networks”, Wireless Communications and Mobile Computing (Willey), Volume 11, No 2, pp. 146-162, February, 2011.
Statistics
0 Views | 0 Downloads
How to Cite
Das, M., Goswami, R. S., Mehta, R. S., & Chakraborty, S. K. (2019). To Achieve Higher Security in Automatic Variable Key Technique towards Optimum Data Transfer with Noise Burst in Cryptosystem. Asian Journal For Convergence In Technology (AJCT). Retrieved from http://www.asianssr.org/index.php/ajct/article/view/841
Section
Article