Abstract
Due to advancement and worldwide rapid deployment of computer networks, the security becomes a major issue. Many mechanisms have been devised and more new ideas are about to propose in coming era. But, all the existing techniques have only one important criterion that key must be sustained and protected at any circumstances. In this regard, the AVK is one of the novel and unbreakable approaches to fulfill such criteria as being experimented so far. In this paper, we have proposed a new technique to generate AVKs which can provide higher security by enhancing the randomness among the generated successive keys. To adhere to our claimed, the comparative studies with existing techniques have also been cited at the end.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Shannon, C.E.: Mathematical theory of communication. Bell System Technical Journal 27(379–423), 623–656 (1984)
Shannon, C.E.: Communication theory of secrecy system. Bell System Technical Journal 28, 656–715 (1949)
Bhunia, T.C.: New approaches for selective AES towards tackling error propagation effect of AES. Asian Journal of Information Technology, 1017–1022(2006)
Bhunia, T.C.: Information technologynetwork and internet, vol. 1. New Age Publication (2005)
Bhunia, T.C., Mondal, G., Samaddar, S.: Theories and application of time variant key in RSA and that with selective encryption in AES. Proc. EAIT, 219–221 (2006)
Chakraborti, P., Bhuyan, B., Chowdhuri, A., Bhunia, C.T.: A novel approach towards realizing optimum data transfer and automatic variable key (AVK). International Journal of Computer Science Network Security 8(5), 241–250 (2008)
Goswami, R.S., Chakraborty, S.K., Bhunia, A., Bhunia, C.T.: Generation of Automatic Variable Key under various Approaches in Cryptography System. Journal of Institute Engineering India Series B 94(4), 215–220 (2014)
Goswami, R.S., Chakraborty, S.K., Bhunia, A., Bhunia, C.T.: Approach towards Optimum Data Transfer with various automatic variable key techniques to achieve perfect security with analysis and comparison. International Journal of Computer Applications 82(1), 28–32 (2013)
Banerjee, S., Dutta, M.P., Bhunia, C.T.: A Novel Approach to Achieve the perfect security through AVK over Insecure Communication Channel. Journal of Institute Engineering India Series B (Communicated)
Banerjee, S., Dutta, M.P., Bhunia, C.T.: A New Three Dimensional Based Key Generation Technique in AVK. Journal of Institute Engineering India Series B (Communicated)
Singh, B.K., Banerjee, S., Dutta, M.P., Bhunia, C.T.: Generation of automatic variable key to make secure communication. In: International Conference on Recent Cognizance in Wireless Communication and Image Processing-ICRCWIP-2014 (2015)
Dutta, M.P., Banerjee, S., Bhunia, C.T.: An Approach to Generate 2-Dimensional AVK to Enhance Security of shared Information. International Journal of Security and Its Applications 9(10), 147–154 (2015)
Dutta, M.P., Banerjee, S., Bhunia, C.T.: Two new schemes to generate automatic variable key (avk) to achieve the perfect security in insecure communication channel. In: Proceedings of the International Conference on Advanced Research in Computer Science Engineering and Technology (ICARCSET, Eluru, India) (2015)
Dutta, M.P., Banerjee, S., Bhunia, C.T.: Generation of variable session keys based on piggybacking strategy. In: Proceedings of 3rd International Conference on Advances in Computing, Electronics and Communication (Zurich, Switzerland) (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Banerjee, S., Dutta, M.P., Bhunia, C.T. (2016). An Approach to Generate Automatic Variable Key to Assure Perfect Security in Cryptosystem. In: Latifi, S. (eds) Information Technology: New Generations. Advances in Intelligent Systems and Computing, vol 448. Springer, Cham. https://doi.org/10.1007/978-3-319-32467-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-32467-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32466-1
Online ISBN: 978-3-319-32467-8
eBook Packages: EngineeringEngineering (R0)