A.Devi

Work place: Cavalier Animation and Media College, Bangalore, Karnataka, India-560 043

E-mail: devianbu75@gmail.com

Website:

Research Interests: Programming Language Theory

Biography

Devi. A received her MCA and M.Phil. from Bharathidasan University, Trichy, India in Computer Science Applications. During 2004-2016(April), she had been with the Department of Computer Science at the Lowry Memorial College, affiliated to Bangalore university, Karnataka, India where she was working as an Associate Professor. During 1998-2001, She was working as a programmer in different software companies. She is currently working as a Professor in Cavalier Animation and Media Science, affiliated to Mysore University, Karnataka, India. She is pursuing her PhD in Compressed Cryptosystem, Bharathidasan University, Trichy, India.

Author Articles
Modified DES using Different Keystreams Based On Primitive Pythagorean Triples

By K.Mani A.Devi

DOI: https://doi.org/10.5815/ijmsc.2017.01.04, Pub. Date: 8 Jan. 2017

Symmetric-key encryption is a traditional form of cryptography, in which a single key is used to encrypt and decrypt a message. In symmetric–key algorithm before any encrypted message is being transmitted, the sender and receiver must know the key value in advance. There are several drawbacks in symmetric-key algorithms. In some algorithms, the size of the key should be same as the size of the original plaintext and maintaining and remembering such a key is very difficult. Further, in symmetric-key algorithms, several round has to be performed to produce the ciphertext and perhaps the same key is used in each round which results in subkey generated from the current round is fully depending on the previous round. To avoid these, a novel approach in generating the key from the keystream for any symmetric-key algorithms using the Primitive Pythagorean Triples(PPT) has been proposed in this paper. The main advantage of this method is that the key value generated from the keystream is chosen by both the sender and the receiver. Further, the size of the key sequence is not limited but its size is arbitrary in length. Since, the keystream generated is random, no need to remember such keys by both the sender and the receiver.

[...] Read more.
Other Articles