{"title":"Cryptography using inverse substitution & key rotation with seed propagation","authors":"R. K. Pathak, S. Meena","doi":"10.1109/ICCIC.2015.7435730","DOIUrl":null,"url":null,"abstract":"This paper has been proposed for secure communication of data over wired and wireless channel with development of simple algorithm and easiness in its implementation. These features have been enabled using key rotation, inverse substitution and seed values propagation. The algorithm used in this paper can utilize both types of key that is symmetrical and asymmetrical key depending on small modification in arithmetical and logical expressions of encryption algorithm at transmitter end and also decryption algorithms at receiver end. So, algorithm is flexible with respect to key selection.","PeriodicalId":276894,"journal":{"name":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIC.2015.7435730","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper has been proposed for secure communication of data over wired and wireless channel with development of simple algorithm and easiness in its implementation. These features have been enabled using key rotation, inverse substitution and seed values propagation. The algorithm used in this paper can utilize both types of key that is symmetrical and asymmetrical key depending on small modification in arithmetical and logical expressions of encryption algorithm at transmitter end and also decryption algorithms at receiver end. So, algorithm is flexible with respect to key selection.