Abstract
By the modernization of computer technology, the possibility of various cryptanalytic attacks increases rapidly, due to which maintaining the confidentiality on insecure channel becomes the burning problem and makes a large arena for the researchers. To tackle such problems and provide suitable solution, many methods have been introduced out of which automatic variable key (AVK) is the most dominated mechanisms as found in theoretical survey. In this paper, we have proposed a new scheme in AVK to generate the sequence of keys on the basis of divisibility factor of previous key. To prove the fruitfulness of our proposed scheme, we have compared our scheme with the existing related schemes based on randomness and standard deviation among the successive keys.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shannon, C.E.: Mathematical theory of communication. Bell Syst. Tech. J. 27(379–423), 623–656 (1984)
Shannon, C.E.: Communication theory of secrecy system. Bell Syst. Tech. J. 28, 656–715 (1949)
Bhunia, C.T.: New approaches for selective AES towards tackling error propagation effect of AES. Asian J. Inf. Technol. 5990, 1017–1022 (2006)
Bhunia, C.T.: Information Technology, Network and Internet. New Age publication
Bhunia, C.T., Mondal, G., Samaddar, S.: Theories and application of time variant key in RSA and that with selective encryption in AES. In: Proceedings of the EAIT, pp. 219–221. Elsevier, Calcutta (2006)
Chakraborti, P., Bhuyan, B., Chowdhuri, A., Bhunia, C.T.: A novel approach towards realizing optimum data transfer and automatic variable key (AVK). Int. J. Comp. Sci. Netw. Secur. 8(5), 241 (2008)
Konar, C., Bhunia, C.T.: A novel approach towards realizing optimum data transfer and AVK in cryptography. Int. J. Comp. Sci. Netw. Secur. 8(5), 241–250 (2008)
Goswami, R.S., Chakraborty, S.K., Bhunia, A., Bhunia, C.T.: Generation of automatic variable key under various approaches in cryptography system. J. Inst. Eng. India Ser. B 94(4), 215–220 (2014)
Goswami, R.S., Chakraborty, S.K., Bhunia, A., Bhunia, C.T.: Approach towards optimum data transfer with various automatic variable key techniques to achieve perfect security with analysis and comparison. Int. J. Comput. Appl. 82(1), 28–32 (2013)
Goswami, R.S., Chakraborty, S.K., Bhunia, A., Bhunia, C.T.: Various new methods of implementing AVK. In: 2nd International Conference on Advances in Computer Science and Engineering, pp. 149–152 (2013)
Banerjee, S., Dutta, M.P., Bhunia, C.T.: A New three dimensional based key generation technique in AVK. Commun. J. Inst. Eng. India Ser. B
Banerjee, S., Dutta, M.P., Bhunia, C.T.: A novel approach to achieve the perfect security through AVK over insecure communication channel. Commun. J. Inst. Eng. India Ser. B
Dutta, M.P., Banerjee, S., Bhunia, C.T.: An approach to generate 2-Dimensional AVK to enhance security of shared information. Int. J. Sec. Appl. 9(10), 147–154 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Singh, B.K., Subhasish Banerjee, Dutta, M.P., Bhunia, C.T. (2016). Generation of Automatic Variable Key to Make Secure Communication. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_36
Download citation
DOI: https://doi.org/10.1007/978-81-322-2638-3_36
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2636-9
Online ISBN: 978-81-322-2638-3
eBook Packages: EngineeringEngineering (R0)