Skip to main content

Markov Analysis of AVK Approach of Symmetric Key Based Cryptosystem

  • Conference paper
  • First Online:
Computational Science and Its Applications -- ICCSA 2015 (ICCSA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9159))

Included in the following conference series:

Abstract

In Symmetric Key Cryptography domain, Automatic Variable Key (AVK) approach is in inception phase because of unavailability of reversible XOR like operators. Fibonacci-Q matrix has emerged as an alternative solution for secure transmission with varying key for different sessions [3, 10]. This paper attempts to analyze symmetric key cryptography scheme based on AVK approach. Due to key variability nature, the AVK approach is assumed to be more powerful, efficient and optimal but its analysis from hackers’ point of view is demonstrated in this paper. This paper also assumes various situations under which mining of future keys can be achieved. The paper also discusses concept of Key variability with less probability of extracted result under various scenario with the different degree of difficulty in key mining.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. http://technet.microsoft.com/en-s/library/cc961628.aspx

  2. Prajapat, S., Jain, A., Thakur, R.S.: A Novel Approach For Information Security With Automatic Variable Key Using Fibonacci Q-Matrix. IJCCT 3(3), 54–57 (2012)

    Google Scholar 

  3. Nalli, A.: On the Hadamard Product of Fibonacci Q n matrix and Fibonacci Q−n matrix. International Journal of Contemporary Mathematical Sciences 1(16), 753–761 (2006)

    MATH  MathSciNet  Google Scholar 

  4. Chakrabarti, P., Bhuyan, B., Chowdhuri, A., Bhunia, C.: A novel approach towards realizing optimum data transfer and Automatic Variable Key (AVK) in cryptography. IJCSNS 8(5), 241 (2008)

    Google Scholar 

  5. Prajapat, S., Thakur, R.S.: Time variant approach towards symmetric key, SAI 2013, pp. 398–405. IEEE

    Google Scholar 

  6. Diffe, W., Hellman, M.: Exhaustive Cryptanalysis of the NBS Data encryption standard. IEEE Computer, 74–84, June 1977

    Google Scholar 

  7. Chakrabarti, P.: Application of Automatic Variable Key (AVK) in RSA. International Journal HIT Transactions on ECCN 2(5)

    Google Scholar 

  8. Bhunia, C.T.: Application of AVK and selective encryption in improving performance of quantum cryptography and network (2006)

    Google Scholar 

  9. Blaze, M., Diffie, W., Rivest, R.L., Schneier, B., Shimomura, T., Thompson, E., Wiener, M.: Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists (1996)

    Google Scholar 

  10. Stakhov, A.P.: Fibonacci matrices, a generalization of the ‘Cassini formula’, and a new coding theory. Chaos, Solutions & Fractals 30(1), 56–66 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  11. Fernández1, M., Diaz1, G., Cosme1, A., Negrón, I., Negrón, P., Alfredo: Cryptography: algorithms and security applications. The IEEE Computer Society’s Student 8(2), Fall 2008

    Google Scholar 

  12. Nadeem, A., Javed, M.Y.: A performance comparison of data encryption algorithms. Information and Communication Technologies, ICICT 2005, pp. 84–89 (2005)

    Google Scholar 

  13. Elminaam, D.S.A., Hadhoud, M.M., Abdul Kader, H.M.: Performance Evaluation of Symmetric Encryption Algorithm. IJCSMS 8(12), 58–64 (2008)

    Google Scholar 

  14. Elminaam, D., Kader, H., Hadhoud, M.: Performance Evaluation of Symmetric Encryption Algorithms on Power Consumption for Wireless Devices. International Journal of Computer Theory and Engineering 1(4), 1793–8201 (2009)

    Google Scholar 

  15. Prajapat, S., Saxena, S., Jain, A., Sharma, P.: Implementation of information security with Fibonacci-Q matrix. In: Proceeding of International Conference ICICIS-2012 and International Journal of Electronics Communication and Computer Engineering, ISSN (Online): 2249-071 62575/BPL/CE/2012

    Google Scholar 

  16. Prajapat, S., Thakur, R.S.: Sparse approach for realizing AVK for Symmetric Key Encryption. IJRDET & proceeding of International Research Conference on Engineering, Science and Management (IRCESM 2014), vol. 2, pp. 15–18

    Google Scholar 

  17. Ross, S.M.: Introduction to Probability models, 10th edn., pp. 191–268

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaligram Prajapat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Prajapat, S., Thakur, R.S. (2015). Markov Analysis of AVK Approach of Symmetric Key Based Cryptosystem. In: Gervasi, O., et al. Computational Science and Its Applications -- ICCSA 2015. ICCSA 2015. Lecture Notes in Computer Science(), vol 9159. Springer, Cham. https://doi.org/10.1007/978-3-319-21413-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21413-9_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21412-2

  • Online ISBN: 978-3-319-21413-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics