Skip to main content

An Approach to Generate Automatic Variable Key to Assure Perfect Security in Cryptosystem

  • Conference paper
  • First Online:
Book cover Information Technology: New Generations

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 448))

  • 2274 Accesses

Abstract

Due to advancement and worldwide rapid deployment of computer networks, the security becomes a major issue. Many mechanisms have been devised and more new ideas are about to propose in coming era. But, all the existing techniques have only one important criterion that key must be sustained and protected at any circumstances. In this regard, the AVK is one of the novel and unbreakable approaches to fulfill such criteria as being experimented so far. In this paper, we have proposed a new technique to generate AVKs which can provide higher security by enhancing the randomness among the generated successive keys. To adhere to our claimed, the comparative studies with existing techniques have also been cited at the end.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shannon, C.E.: Mathematical theory of communication. Bell System Technical Journal 27(379–423), 623–656 (1984)

    MathSciNet  MATH  Google Scholar 

  2. Shannon, C.E.: Communication theory of secrecy system. Bell System Technical Journal 28, 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  3. Bhunia, T.C.: New approaches for selective AES towards tackling error propagation effect of AES. Asian Journal of Information Technology, 1017–1022(2006)

    Google Scholar 

  4. Bhunia, T.C.: Information technologynetwork and internet, vol. 1. New Age Publication (2005)

    Google Scholar 

  5. Bhunia, T.C., Mondal, G., Samaddar, S.: Theories and application of time variant key in RSA and that with selective encryption in AES. Proc. EAIT, 219–221 (2006)

    Google Scholar 

  6. Chakraborti, P., Bhuyan, B., Chowdhuri, A., Bhunia, C.T.: A novel approach towards realizing optimum data transfer and automatic variable key (AVK). International Journal of Computer Science Network Security 8(5), 241–250 (2008)

    Google Scholar 

  7. Goswami, R.S., Chakraborty, S.K., Bhunia, A., Bhunia, C.T.: Generation of Automatic Variable Key under various Approaches in Cryptography System. Journal of Institute Engineering India Series B 94(4), 215–220 (2014)

    Article  Google Scholar 

  8. Goswami, R.S., Chakraborty, S.K., Bhunia, A., Bhunia, C.T.: Approach towards Optimum Data Transfer with various automatic variable key techniques to achieve perfect security with analysis and comparison. International Journal of Computer Applications 82(1), 28–32 (2013)

    Article  Google Scholar 

  9. Banerjee, S., Dutta, M.P., Bhunia, C.T.: A Novel Approach to Achieve the perfect security through AVK over Insecure Communication Channel. Journal of Institute Engineering India Series B (Communicated)

    Google Scholar 

  10. Banerjee, S., Dutta, M.P., Bhunia, C.T.: A New Three Dimensional Based Key Generation Technique in AVK. Journal of Institute Engineering India Series B (Communicated)

    Google Scholar 

  11. Singh, B.K., Banerjee, S., Dutta, M.P., Bhunia, C.T.: Generation of automatic variable key to make secure communication. In: International Conference on Recent Cognizance in Wireless Communication and Image Processing-ICRCWIP-2014 (2015)

    Google Scholar 

  12. Dutta, M.P., Banerjee, S., Bhunia, C.T.: An Approach to Generate 2-Dimensional AVK to Enhance Security of shared Information. International Journal of Security and Its Applications 9(10), 147–154 (2015)

    Article  Google Scholar 

  13. Dutta, M.P., Banerjee, S., Bhunia, C.T.: Two new schemes to generate automatic variable key (avk) to achieve the perfect security in insecure communication channel. In: Proceedings of the International Conference on Advanced Research in Computer Science Engineering and Technology (ICARCSET, Eluru, India) (2015)

    Google Scholar 

  14. Dutta, M.P., Banerjee, S., Bhunia, C.T.: Generation of variable session keys based on piggybacking strategy. In: Proceedings of 3rd International Conference on Advances in Computing, Electronics and Communication (Zurich, Switzerland) (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhasish Banerjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Banerjee, S., Dutta, M.P., Bhunia, C.T. (2016). An Approach to Generate Automatic Variable Key to Assure Perfect Security in Cryptosystem. In: Latifi, S. (eds) Information Technology: New Generations. Advances in Intelligent Systems and Computing, vol 448. Springer, Cham. https://doi.org/10.1007/978-3-319-32467-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32467-8_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32466-1

  • Online ISBN: 978-3-319-32467-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics