Full Paper View Go Back

Cryptography Automata Based Key Generation

Harsh Bhasin1 , Neha Kathuria2

Section:Research Paper, Product Type: Journal
Vol.1 , Issue.2 , pp.15-17, Jun-2013

Online published on Jun 30, 2013


Copyright © Harsh Bhasin , Neha Kathuria . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Harsh Bhasin , Neha Kathuria, “Cryptography Automata Based Key Generation,” International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.15-17, 2013.

MLA Style Citation: Harsh Bhasin , Neha Kathuria "Cryptography Automata Based Key Generation." International Journal of Scientific Research in Network Security and Communication 1.2 (2013): 15-17.

APA Style Citation: Harsh Bhasin , Neha Kathuria, (2013). Cryptography Automata Based Key Generation. International Journal of Scientific Research in Network Security and Communication, 1(2), 15-17.

BibTex Style Citation:
@article{Bhasin_2013,
author = {Harsh Bhasin , Neha Kathuria},
title = {Cryptography Automata Based Key Generation},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2013},
volume = {1},
Issue = {2},
month = {6},
year = {2013},
issn = {2347-2693},
pages = {15-17},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=46},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=46
TI - Cryptography Automata Based Key Generation
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Harsh Bhasin , Neha Kathuria
PY - 2013
DA - 2013/06/30
PB - IJCSE, Indore, INDIA
SP - 15-17
IS - 2
VL - 1
SN - 2347-2693
ER -

4790 Views    4377 Downloads    4285 Downloads
  
  

Abstract :
Cellular Automata is one of the most fascinating disciplines. It is being used in many practical applications but it’s used in cryptography is still not being explored¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬¬. A technique of generating key for public key cryptography has been proposed in the work. The work also applies different tests to the data generated by the application developed to generate cryptography key. It is found that the key is generated follows the gap test and frequency test .Moreover, the coefficient of autocorrelation of the data generated is also apt. Therefore, the method can be safely used in public key cryptography. The strength of the key generated is being tested against AES.

Key-Words / Index Term :
Cryptography, Key Generation, Cellular Automata, Gap Test, Frequency Test

References :
[1] Harsh Bhasin, Ramesh Kumar, Neha Kathuria, ‘Cryptography using Cellular Automata’, International Journal of Computer Science and Information technologies, Vol. 4 (2), 2013.
[2] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networksâ€, International Journal of Computer Science and Information Security (IJCSIS) USA, Vol-9, No.4, pp (106-111), April 2011.
[3] Harsh Bhasin, “Corpuscular Random Number Generatorâ€, International Journal of Information and Electronics Engineering, Vol. 2 (2), 2012.
[4] Harsh Bhasin, Nakul Arora, “ Cryptography Using Genetic Algorithmâ€, Reliability Infocom Technology and Optimization,2010



[5] Barbara Kitchenham, O. Pearl Brereton, David Budgen, Mark Turner, John Bailey, Stephen Linkman, “Systematic literature reviews in software engineering – A systematic literature reviewâ€, Journal Information software technologiesâ€, Vol. 51 (1), 2009.
[6] Harsh Bhasin, “Use of Cellular Automata Patterns in Cryptography†in National Conference on Advances in Computational Intelligence, 2011.

[7] Sonia Goyat, “Cryptography using Genetic Algorithmâ€, IOSR Journal of Computer Engineering, Vol. 1 (5), 2012.
[8] Benjamin Jun, Paul Kocher, "The Intel Random Number Generatorâ€, Cryptography Research, Inc. White Paper Prepared For Intel Corporation, 1999.
[9] K. J. Jegadish Kumar, K. Chenna Kesava Reddy, S. Salivahanan, “Novel and Efficient Cellular Automata based Symmetric Key Encryption Algorithm for Wireless Sensor Networksâ€, International Journal of Computer Applications Vol. 13 (4), 2011.
[10] Sonia Goyat, “Genetic Key Generation For Public Key Cryptographyâ€, International Journal of Soft Computing and Engineering (IJSCE), Vol. 2 (3), 2012.
[11] Uttam Kr. Mondal, Satyendra Nath Mandal, J. Pal Choudhury, J. K. Mandal , “Frame Based Symmetric Key Cryptographyâ€, International Journal Advanced Networking and Applications 762 Vol. 2 (4), 2011.
[12] Farhat Ullah Khan, Surbhi Bhatia, “A Novel Approach To Genetic Algorithm Based Cryptographyâ€, International Journal of Research in Computer Science, Vol. 2 (3), 2012. Introduction

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation