Showing 1–2 of 2 results for author: Suneetha, C
-
A Block Cipher using Rotation and Logical XOR Operations
Authors:
D. Sravana Kumar,
CH. Suneetha,
A. Chandrasekhar
Abstract:
Cryptography is the study of methods of sending messages in disguised form so that only the intended recipients can remove the disguise and read the messages. Information security has become a very critical aspect of modern communication systems. With the global acceptance of the Internet as a medium of communication, virtually every computer in the world is connected to every other. It has create…
▽ More
Cryptography is the study of methods of sending messages in disguised form so that only the intended recipients can remove the disguise and read the messages. Information security has become a very critical aspect of modern communication systems. With the global acceptance of the Internet as a medium of communication, virtually every computer in the world is connected to every other. It has created a new risk for the users of the computers with a constant threat of being hacked and being victims of data theft. In this connection data encryption has become an essential part of secure communication of the messages. In the present paper we propose a new method of encryption of data in blocks using the operations Rotation and Logical XOR
△ Less
Submitted 9 February, 2012;
originally announced February 2012.
-
Encryption of Data using Elliptic Curve over Finite fields
Authors:
D. Sravana Kumar,
CH. Suneetha,
A. Chandrasekhar
Abstract:
Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. Public-key encryption schemes are secure only if the authenticity of the public-key is assured. Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography (ECC) schemes including key exchange, encryption and digital signature. The principal attraction of elliptic c…
▽ More
Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. Public-key encryption schemes are secure only if the authenticity of the public-key is assured. Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography (ECC) schemes including key exchange, encryption and digital signature. The principal attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the processing overhead. In the present paper we propose a new encryption algorithm using some Elliptic Curve over finite fields
△ Less
Submitted 9 February, 2012;
originally announced February 2012.