DocumentCode :
2150282
Title :
A block cryptographic method for communication network - its prospects and limitations
Author :
Sur, Chiranjib
Author_Institution :
Dept. of Electron. & Commun. Eng., Nat. Inst. of Technol., Durgapur, India
Volume :
5
fYear :
2010
fDate :
26-28 Feb. 2010
Firstpage :
532
Lastpage :
534
Abstract :
The communication world still looking forward for a highly sophisticated, dynamic, probabilistic, key-independent unique secure data transfer procedure for an ad hoc network. The job is not at all easy as it require to synchronise or rather globalise several network criteria of different vendors producing diversified hardware specification and complexity. However it has been tried to get above the limitations and define a highly dependent algorithm which is no doubt processor-hungry and power-consuming but the advantage is its ability to reduce the burden of increasing bits to keep away the scope of cryptanalysis, which is the governing term for sniffing and hacking a network system. Communication networks now a days demand more and more security due to large number of network filtration and noise. With the advent of new type of communication networks like sensor networks and tough competition of bandwidth consumption it has become necessary to encrypt the data so that during reception the data can be properly processed and prevent others to interfere and also restrict itself to get entangled to malfunctions. Also the availability of enormous processing speed the semiconductor world has paved the way for a greater opportunity for parallel computing and implementation of complex architecture.
Keywords :
ad hoc networks; cryptography; ad hoc network; bandwidth consumption; block cryptographic method; cryptanalysis; data transfer; diversified hardware specification; network filtration; parallel computing; Ad hoc networks; Communication networks; Communication system security; Computer crime; Cryptography; Data security; Filtration; Hardware; Power system security; Semiconductor device noise; decryption; encryption; fast fourier transform; parity; sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on
Conference_Location :
Singapore
Print_ISBN :
978-1-4244-5585-0
Electronic_ISBN :
978-1-4244-5586-7
Type :
conf
DOI :
10.1109/ICCAE.2010.5451272
Filename :
5451272
Link To Document :
بازگشت