MAT-V: A strong cryptography algorithm for stream cipher techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 5
Abstract
To improve and increase greater security, efficiency, confidentiality for end user in stream cipher algorithms and also increases complexity for all types of attackers such as correlation attack and linear syndrome attack. MAT-V algorithm is asymmetric key cipher technique each character is encrypted with different private keys. So that increases complexity for attacker to identify original message sent by user. This algorithm provides confidentiality, authentication and data integrity and access control. Different keys are generated based on mathematical solutions of encryption keys and decryption keys. This algorithm reduces drawbacks of PKZIP, ORYX and SEAL drawbacks.
Authors and Affiliations
VANI . N , SRIDEVI MALIPATIL , CHETHANA . C
Cloud computing for mobile trauma care
Cloud computing is the newly evolved next generation’s technology , emphasizes on sharing and virtualization concept, caries a solution for providing more secured, economic on air services. Involves software, platform, i...
An Evaluation of A Country Based Anti- Phishing Approach Using Formal Methods
Phishing is a fraudulent attack that steals confidential information by mimicking a trustworthy entity in a medium of electronic communication. In this paper, research was conducted to evaluate a proposed country-based m...
Handwritten Character Recognition with Feedback Neural Network
The ability of a machine to interpret handwritten characters from sources like paper document, photograph, etc. to some editable computerized form is the first and foremost aim of handwritten character recognition system...
An Analytic Report on Ontology Based Search Engine
Ontology based search engine is a tool that helps you in retrieving required information from the web by only considering the logical denotation of the submitted query. The semantic based search engines are the annotated...
SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION
The main goal of this paper is to embed a watermark in the speech signal, using the three techniques such as Discrete Cosine Transform (DCT) along with Singular Value Decomposition (SVD) and Discrete Wavelet Transform (D...