Research Article

An Axiomatic Approach for Secure Data Transmission

by  Srishti Agarwal, Anurag Malik
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Issue 9
Published: May 2013
Authors: Srishti Agarwal, Anurag Malik
10.5120/11870-7664
PDF

Srishti Agarwal, Anurag Malik . An Axiomatic Approach for Secure Data Transmission. International Journal of Computer Applications. 69, 9 (May 2013), 15-20. DOI=10.5120/11870-7664

                        @article{ 10.5120/11870-7664,
                        author  = { Srishti Agarwal,Anurag Malik },
                        title   = { An Axiomatic Approach for Secure Data Transmission },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 69 },
                        number  = { 9 },
                        pages   = { 15-20 },
                        doi     = { 10.5120/11870-7664 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Srishti Agarwal
                        %A Anurag Malik
                        %T An Axiomatic Approach for Secure Data Transmission%T 
                        %J International Journal of Computer Applications
                        %V 69
                        %N 9
                        %P 15-20
                        %R 10.5120/11870-7664
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is the strongest link in the chain of security since it plays an integral role in secure communication. Symmetric key cryptography is the oldest form of cryptology in which identical keys are used by the sender and receiver to share the confidential data. This research paper is about analyzing and designing of a symmetric key cryptographic technique which provides security at enhanced level and offer defense against non-traditional security threats. The algorithm "An Axiomatic Approach for Secure Data Transmission" is compared with the algorithm "Advanced Encryption Standards", analytical results are also shown to prove the better outcomes.

References
  • Ayushi "A symmetric Key Cryptography" Published in International Journal of Computer Applications (0975-8887), Vol. 1, No. 15, pp 1-4
  • H. Lee Kwang "Basic Encryption and Decryption"
  • Himani Agrawal and Monisha Sharma "Implementation and analysis of various symmetric cryptosystems", Indian Journal of Science and Technology Vol. 3 No. 12 (Dec 2010) ISSN: 0974- 6846, pp. 1173-1176
  • http://csrc. nist. gov/publications/fips/fips197/fips-197. pdf
  • http://williamstallings. com/Crypto/Crypto4e. html
  • http://www. garykessler. net/library/crypto. html
  • http://www. go4expert. com/forums/showthread. php?t=19704
  • http://www-jj. cs. tu-dortmund. de/secse/pages/research/motivation_en. shtml
  • http://www. topbits. com/plaintext-and-ciphertext. html
  • http://www. ukessays. co. uk/essays/engineering/background-and-research-motivation. php
  • mbandukda. files. wordpress. com/2008/03/cryptosystems. doc
  • www. cl. cam. ac. uk/~rja14/Papers/SE-05. pdf
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Symmetric Key Cryptography Cipher text Block Cipher Encryption/Decryption Minimized CPU Utilization Increased Key Complexity Minimized Memory Utilization Advanced Encryption Standards

Powered by PhDFocusTM