Boolean Algebra based effective and efficient asymmetric key cryptography algorithm: BAC algorithm

N. Kumar, Pankaj Gupta, M. Sahu, M. A. Rizvi
{"title":"Boolean Algebra based effective and efficient asymmetric key cryptography algorithm: BAC algorithm","authors":"N. Kumar, Pankaj Gupta, M. Sahu, M. A. Rizvi","doi":"10.1109/IMAC4S.2013.6526417","DOIUrl":null,"url":null,"abstract":"The Internet was born of academic efforts to share information; it never strove for high security measures. It plays important role in becoming people online, this mode is easy and effective but dangerous too in terms of data hacking and cracking by unauthorized persons. It is needed that while using Internet data must be secured and personal. Encryption can be used to protect data in transit, for example data being transferred via network (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks. Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication codes (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. In this paper an attempt is made to develop new encryption and decryption algorithm and implemented in Java, it gives very encouraging results in small as well as in large data files.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMAC4S.2013.6526417","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

The Internet was born of academic efforts to share information; it never strove for high security measures. It plays important role in becoming people online, this mode is easy and effective but dangerous too in terms of data hacking and cracking by unauthorized persons. It is needed that while using Internet data must be secured and personal. Encryption can be used to protect data in transit, for example data being transferred via network (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks. Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication codes (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. In this paper an attempt is made to develop new encryption and decryption algorithm and implemented in Java, it gives very encouraging results in small as well as in large data files.
基于布尔代数的高效非对称密钥加密算法:BAC算法
互联网诞生于学术上分享信息的努力;它从未努力采取高度安全措施。它在人们上网的过程中起着重要的作用,这种模式简单有效,但也有被未经授权的人入侵和破解数据的危险。这是需要的,而使用互联网的数据必须是安全和个人的。加密可用于保护传输中的数据,例如通过网络(例如互联网、电子商务)、移动电话、无线麦克风、无线对讲系统、蓝牙设备和银行自动柜员机传输的数据。加密传输中的数据也有助于保护数据,因为通常很难对所有网络访问进行物理保护。加密本身可以保护消息的机密性,但仍然需要其他技术来保护消息的完整性和真实性;例如,消息验证码(MAC)或数字签名的验证。执行加密的标准和加密软件和硬件广泛可用,但成功地使用加密来确保安全性可能是一个具有挑战性的问题。系统设计或执行中的一个小失误就可能导致成功的攻击。有时攻击者可以在不直接解除加密的情况下获得未加密的信息。本文尝试开发一种新的加密和解密算法,并在Java上实现,它在小数据文件和大数据文件中都取得了令人鼓舞的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信