Abstract
The rapid extensive growth of the technology and ever increasing availability of computing resources are existed in the IT field. Furthermore, users have unauthorized access to information due to improper security measures. In this paper we proposed a new security approach to protect the information as well as to overcome the limitations which are existed in earlier approach. Here the algorithm generates Base Index, Numeric & Alpha Numeric Indexing tables and should apply rotational shifts on these tables by the user. The Indexing tables should use 6-bit character indexing with 6 time rotational shifts to eliminate duplicated values. This paper allows the Encryption and Decryption process to Alphanumeric with space and comma (,) characters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zibideh, W.Y.: Modified-DES encryption algorithm with improved BER performance in wireless communication. In: Radio and Wireless Symposium (RWS), pp. 219–222. IEEE (2011)
Godavarty, V.K.: UsingQuasigroups for Generating Pseudorandom Numbers, Arxiv preprint arXiv:1112.1048 - arxiv.org (2011)
Ayushi: A Symmetric Key Cryptographic Algorithm. Int. Journal of Computer Applications 1(5) (2010)
Pointcheval, D.: Asymmetric cryptography ad practical security. Journal of Telecommunication and Information Technology, 42–56 (2002)
Rupa, C., Sudha Kishore, R., Avadhani, P.S.: An Advanced Authentication using Rotational Shifts. Int. Journal of Advanced Engineering and Technology 5 (2012)
Rubesh Anand, P.M., Bajpai, G., Bhaskar, V.: Real-Time Symmetric cryptography using Quaternion Julia Set. International Journal of Computer Science and network Security 9(3), 20–26 (2009)
Xiang, L., et al.: A Secure Steganographic Method via Multiple Choice Questions. Information Journal 10(5), 992–1000 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Hussain, S.S., Rupa, C., Avadhani, P.S., Reddy, E.S. (2014). An Advanced Authentication System Using Rotational Cryptographic Algorithm. In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II. Advances in Intelligent Systems and Computing, vol 249. Springer, Cham. https://doi.org/10.1007/978-3-319-03095-1_54
Download citation
DOI: https://doi.org/10.1007/978-3-319-03095-1_54
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03094-4
Online ISBN: 978-3-319-03095-1
eBook Packages: EngineeringEngineering (R0)