Title :
Linear algorithm for Imbricate Cryptography using Pseudo Random Number Generator
Author :
Rastogi, Rohit ; Mittal, Shashank ; Shekhar, Shashank
Author_Institution :
CSE Dept., ABES Eng. Coll., Ghaziabad, India
Abstract :
In this paper we are going to establish the relationship between Randomness and Cryptography. We are going to generate an algorithm by combining the result of the Linear Congruential Pseudo Random Number Generator with Imbricate Cryptography. The following algorithm is Symmetric type Cryptography. It uses a layered approach. The first layer involves implanting a randomly generated number in the text and then transforming the text to form the cipher text at the very first layer. Second layer involves implanting the key to the cipher text obtained in the first layer thus making the security a two way approach. Therefore, the message can only be recovered by using the correct key and the correct Random number generated. The Random number generated is transmitted to the user with the key. Here the message and the key are inwardly plaited. It is not possible to find the key by permutation and combination since the user can choose key of variable length. Multiple Layers of encryption and decryption provide security. The advantage of the process is that it prevents cipher text only attack and known plain text attack. It is also easily computable and efficient.
Keywords :
cryptography; random number generation; cipher text only attack; imbricate cryptography; linear algorithm; linear congruential pseudo random number generator; plain text attack; Bismuth; Ciphers; Encryption; Generators; Receivers; Bitmap File; Encryption; Imbricate Cryptography; Linear Congruential Generator; Network security;
Conference_Titel :
Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on
Conference_Location :
New Delhi
Print_ISBN :
978-9-3805-4415-1