Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption
Mathematics and Computer Science
Volume 2, Issue 3, May 2017, Pages: 27-30
Received: May 11, 2017;
Accepted: May 25, 2017;
Published: Jul. 7, 2017
Views 182 Downloads 8
Audai Al-Fandi, Department of Computer Science and Information System, Alma’Arefa Colleges of Science and Technology, Riyadh, Saudi Arabia
Yazeed Al-Howifer, Department of Computer Science and Information System, Alma’Arefa Colleges of Science and Technology, Riyadh, Saudi Arabia
When it comes to the subject of encryption of communication streams, two key exchange methods are widely used asymmetric and symmetric key algorithms. However, neither of these methods is perfect. This paper will an algorithm that changes keys periodically without exchanging them between parties of the communication, the paper will discuss how this algorithm will solve some of the drawbacks of the widely used asymmetric and symmetric key algorithms.
Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption, Mathematics and Computer Science.
Vol. 2, No. 3,
2017, pp. 27-30.
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/
) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
M. E. Whitman and H. J. Mattord, Principles of information security. Cengage Learning, 2011.
S. Singh, "The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography."
S. Garg and M. K. Rana, "A Review on RSA Encryption Algorithm."
G. Oparnica, "Digital evidence and digital forensic education," Digital Evidence & Elec. Signature L. Rev., vol. 13, p. 143, 2016.
H. Hou, "An authenticated certificateless key agreement protocol without bilinear pairing," in Computer Science and Service System (CSSS), 2011 International Conference on, 2011, pp. 2986-2989: IEEE.
M. Blumenthal, "Encryption: Strengths and Weaknesses of Public-key Cryptography," CSRS 2007, p. 1, 2007.
P. Rasmi and V. Paul, "A Hybrid Crypto System based on a new CircleSymmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications," in International Conference on VLSI, Communication & Instrumentation. Kerala, 2011, vol. 9, pp. 14-18.
S. M. Matyas et al., "Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors," ed: Google Patents, 1992.
D. B. Cross, J. Gu, J. D. Benaloh, T. C. Jones, P. J. Leach, and G. D. Pittaway, "Deriving a symmetric key from an asymmetric key for file encryption or decryption," ed: Google Patents, 2007.
T. Teerakanok and S. Kamolphiwong, "Accelerating asymmetric-key cryptography using Parallel-key Cryptographic Algorithm (PCA)," in Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, 2009. ECTI-CON 2009. 6th International Conference on, 2009, vol. 2, pp. 812-815: IEEE.
F. F. Moghaddam, M. T. Alrashdan, and O. Karimi, "A hybrid encryption algorithm based on RSA small-e and efficient-RSA for cloud computing environments," Journal of Advances in Computer Networks, vol. 1, no. 3, pp. 238-241, 2013.
R. Ganesan, "Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography," ed: Google Patents, 1996.
P. G. Naik and G. R. Naik, "Asymmetric Key Encryption using Genetic Algorithm," International Journal of Latest Trends in Engineering and Technology (IJLTET), vol. 3, no. 3, pp. 118-128, 2014.
C. Beeson, "Asymmetric key cryptosystem based on shared knowledge," ed: Google Patents, 2006.