| Peer-Reviewed

Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption

Received: 11 May 2017    Accepted: 25 May 2017    Published: 7 July 2017
Views:       Downloads:
Abstract

When it comes to the subject of encryption of communication streams, two key exchange methods are widely used asymmetric and symmetric key algorithms. However, neither of these methods is perfect. This paper will an algorithm that changes keys periodically without exchanging them between parties of the communication, the paper will discuss how this algorithm will solve some of the drawbacks of the widely used asymmetric and symmetric key algorithms.

Published in Mathematics and Computer Science (Volume 2, Issue 3)
DOI 10.11648/j.mcs.20170203.11
Page(s) 27-30
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Encryption, Asymmetric, Symmetric, Volatile Keys, Communication Algorithms

References
[1] M. E. Whitman and H. J. Mattord, Principles of information security. Cengage Learning, 2011.
[2] S. Singh, "The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography."
[3] S. Garg and M. K. Rana, "A Review on RSA Encryption Algorithm."
[4] G. Oparnica, "Digital evidence and digital forensic education," Digital Evidence & Elec. Signature L. Rev., vol. 13, p. 143, 2016.
[5] H. Hou, "An authenticated certificateless key agreement protocol without bilinear pairing," in Computer Science and Service System (CSSS), 2011 International Conference on, 2011, pp. 2986-2989: IEEE.
[6] M. Blumenthal, "Encryption: Strengths and Weaknesses of Public-key Cryptography," CSRS 2007, p. 1, 2007.
[7] P. Rasmi and V. Paul, "A Hybrid Crypto System based on a new CircleSymmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications," in International Conference on VLSI, Communication & Instrumentation. Kerala, 2011, vol. 9, pp. 14-18.
[8] S. M. Matyas et al., "Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors," ed: Google Patents, 1992.
[9] D. B. Cross, J. Gu, J. D. Benaloh, T. C. Jones, P. J. Leach, and G. D. Pittaway, "Deriving a symmetric key from an asymmetric key for file encryption or decryption," ed: Google Patents, 2007.
[10] T. Teerakanok and S. Kamolphiwong, "Accelerating asymmetric-key cryptography using Parallel-key Cryptographic Algorithm (PCA)," in Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, 2009. ECTI-CON 2009. 6th International Conference on, 2009, vol. 2, pp. 812-815: IEEE.
[11] F. F. Moghaddam, M. T. Alrashdan, and O. Karimi, "A hybrid encryption algorithm based on RSA small-e and efficient-RSA for cloud computing environments," Journal of Advances in Computer Networks, vol. 1, no. 3, pp. 238-241, 2013.
[12] R. Ganesan, "Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography," ed: Google Patents, 1996.
[13] P. G. Naik and G. R. Naik, "Asymmetric Key Encryption using Genetic Algorithm," International Journal of Latest Trends in Engineering and Technology (IJLTET), vol. 3, no. 3, pp. 118-128, 2014.
[14] C. Beeson, "Asymmetric key cryptosystem based on shared knowledge," ed: Google Patents, 2006.
Cite This Article
  • APA Style

    Audai Al-Fandi, Yazeed Al-Howifer. (2017). Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption. Mathematics and Computer Science, 2(3), 27-30. https://doi.org/10.11648/j.mcs.20170203.11

    Copy | Download

    ACS Style

    Audai Al-Fandi; Yazeed Al-Howifer. Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption. Math. Comput. Sci. 2017, 2(3), 27-30. doi: 10.11648/j.mcs.20170203.11

    Copy | Download

    AMA Style

    Audai Al-Fandi, Yazeed Al-Howifer. Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption. Math Comput Sci. 2017;2(3):27-30. doi: 10.11648/j.mcs.20170203.11

    Copy | Download

  • @article{10.11648/j.mcs.20170203.11,
      author = {Audai Al-Fandi and Yazeed Al-Howifer},
      title = {Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption},
      journal = {Mathematics and Computer Science},
      volume = {2},
      number = {3},
      pages = {27-30},
      doi = {10.11648/j.mcs.20170203.11},
      url = {https://doi.org/10.11648/j.mcs.20170203.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.mcs.20170203.11},
      abstract = {When it comes to the subject of encryption of communication streams, two key exchange methods are widely used asymmetric and symmetric key algorithms. However, neither of these methods is perfect. This paper will an algorithm that changes keys periodically without exchanging them between parties of the communication, the paper will discuss how this algorithm will solve some of the drawbacks of the widely used asymmetric and symmetric key algorithms.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Symmetric Volatile Shared Key Encryption: A Two-way Communication Shared Key Encryption
    AU  - Audai Al-Fandi
    AU  - Yazeed Al-Howifer
    Y1  - 2017/07/07
    PY  - 2017
    N1  - https://doi.org/10.11648/j.mcs.20170203.11
    DO  - 10.11648/j.mcs.20170203.11
    T2  - Mathematics and Computer Science
    JF  - Mathematics and Computer Science
    JO  - Mathematics and Computer Science
    SP  - 27
    EP  - 30
    PB  - Science Publishing Group
    SN  - 2575-6028
    UR  - https://doi.org/10.11648/j.mcs.20170203.11
    AB  - When it comes to the subject of encryption of communication streams, two key exchange methods are widely used asymmetric and symmetric key algorithms. However, neither of these methods is perfect. This paper will an algorithm that changes keys periodically without exchanging them between parties of the communication, the paper will discuss how this algorithm will solve some of the drawbacks of the widely used asymmetric and symmetric key algorithms.
    VL  - 2
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • Department of Computer Science and Information System, Alma’Arefa Colleges of Science and Technology, Riyadh, Saudi Arabia

  • Department of Computer Science and Information System, Alma’Arefa Colleges of Science and Technology, Riyadh, Saudi Arabia

  • Sections