{"title":"采用先进的替换技术和对称密钥生成算法的密码系统","authors":"S. Gomathi","doi":"10.1109/ISCO.2014.7103948","DOIUrl":null,"url":null,"abstract":"Cryptographic algorithm plays an important role to secure the confidential data while transmitting over the cloud. Modern cryptography offers a variety of encryption scheme for protecting the data. A key used for encrypting the plain text is another vital component on which the secrets depend. Advanced Encryption Standard (AES) algorithm is used in this research. This paper focus on developing a new way to generate the key called Chaive Unica (CU) which is used only once and a new way of substitution method called Advanced Substitution Technique (AST) which is more secure to encrypt the message. The plain text is encrypted twice before sending the message into algorithm. A new architecture is proposed in order to encrypt the text in secured way.","PeriodicalId":119329,"journal":{"name":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A cryptography using advanced substitution technique and symmetric key generating algorithm\",\"authors\":\"S. Gomathi\",\"doi\":\"10.1109/ISCO.2014.7103948\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptographic algorithm plays an important role to secure the confidential data while transmitting over the cloud. Modern cryptography offers a variety of encryption scheme for protecting the data. A key used for encrypting the plain text is another vital component on which the secrets depend. Advanced Encryption Standard (AES) algorithm is used in this research. This paper focus on developing a new way to generate the key called Chaive Unica (CU) which is used only once and a new way of substitution method called Advanced Substitution Technique (AST) which is more secure to encrypt the message. The plain text is encrypted twice before sending the message into algorithm. A new architecture is proposed in order to encrypt the text in secured way.\",\"PeriodicalId\":119329,\"journal\":{\"name\":\"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)\",\"volume\":\"204 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCO.2014.7103948\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCO.2014.7103948","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A cryptography using advanced substitution technique and symmetric key generating algorithm
Cryptographic algorithm plays an important role to secure the confidential data while transmitting over the cloud. Modern cryptography offers a variety of encryption scheme for protecting the data. A key used for encrypting the plain text is another vital component on which the secrets depend. Advanced Encryption Standard (AES) algorithm is used in this research. This paper focus on developing a new way to generate the key called Chaive Unica (CU) which is used only once and a new way of substitution method called Advanced Substitution Technique (AST) which is more secure to encrypt the message. The plain text is encrypted twice before sending the message into algorithm. A new architecture is proposed in order to encrypt the text in secured way.