Research Article

Comparative Study on Vernam Cipher stream and Rail ‎Fence Stream in IoT

by  Adnan Adel Bitar, V. Sujatha
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Issue 31
Published: Jun 2020
Authors: Adnan Adel Bitar, V. Sujatha
10.5120/ijca2020920366
PDF

Adnan Adel Bitar, V. Sujatha . Comparative Study on Vernam Cipher stream and Rail ‎Fence Stream in IoT. International Journal of Computer Applications. 176, 31 (Jun 2020), 38-40. DOI=10.5120/ijca2020920366

                        @article{ 10.5120/ijca2020920366,
                        author  = { Adnan Adel Bitar,V. Sujatha },
                        title   = { Comparative Study on Vernam Cipher stream and Rail ‎Fence Stream in IoT },
                        journal = { International Journal of Computer Applications },
                        year    = { 2020 },
                        volume  = { 176 },
                        number  = { 31 },
                        pages   = { 38-40 },
                        doi     = { 10.5120/ijca2020920366 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2020
                        %A Adnan Adel Bitar
                        %A V. Sujatha
                        %T Comparative Study on Vernam Cipher stream and Rail ‎Fence Stream in IoT%T 
                        %J International Journal of Computer Applications
                        %V 176
                        %N 31
                        %P 38-40
                        %R 10.5120/ijca2020920366
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Many encryption algorithms have been used to achieve the needed performance of ‎securing data. And each encryption algorithm has its pros and cons. Due to the ‎development of IoT in many areas and the continuous increase in its devices, securing ‎data being transmitted became nigh on impossible.

References
  • Seagate.com: The digitization of the world from edge to core, 2018‎
  • http://www.crypto-it.net/eng/simple/rail-fence-cipher.html
  • Dar. Jawad Ahmad and Sharma. Sandeep, “Implementation of One Time Pad Cipher ‎with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data ‎security”, International Journal of Science and Research, vol 3 issue 11, 2014‎
  • https://web.archive.org/web/20110518125721/http://www.simonsingh.net/The_Black_‎Chamber/railfence.html
  • https://web.archive.org/web/20121010011445/https://www.nsa.gov/about/_files/cryptologic_heritage/publications/misc/tsec_kw26.pdf)‎
  • Wang. Liyan, Li. Yonghua, Jia. Siqi, Gang. Jiatai,.” A stream cipher algorithm based on ‎composite chaotic dynamical systems”. Journal of Dalian University of ‎Technology, vol 52. 2012.‎
  • Shannon. C.E, “Communication theory of secrecy systems”, Bell System Technical ‎Journal, vol 28, no.4, pp. 656-715,1949.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Security Vernam Rail-Fence encryption performance IoT

Powered by PhDFocusTM