Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 249))

Abstract

The rapid extensive growth of the technology and ever increasing availability of computing resources are existed in the IT field. Furthermore, users have unauthorized access to information due to improper security measures. In this paper we proposed a new security approach to protect the information as well as to overcome the limitations which are existed in earlier approach. Here the algorithm generates Base Index, Numeric & Alpha Numeric Indexing tables and should apply rotational shifts on these tables by the user. The Indexing tables should use 6-bit character indexing with 6 time rotational shifts to eliminate duplicated values. This paper allows the Encryption and Decryption process to Alphanumeric with space and comma (,) characters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zibideh, W.Y.: Modified-DES encryption algorithm with improved BER performance in wireless communication. In: Radio and Wireless Symposium (RWS), pp. 219–222. IEEE (2011)

    Google Scholar 

  2. Godavarty, V.K.: UsingQuasigroups for Generating Pseudorandom Numbers, Arxiv preprint arXiv:1112.1048 - arxiv.org (2011)

    Google Scholar 

  3. Ayushi: A Symmetric Key Cryptographic Algorithm. Int. Journal of Computer Applications 1(5) (2010)

    Google Scholar 

  4. Pointcheval, D.: Asymmetric cryptography ad practical security. Journal of Telecommunication and Information Technology, 42–56 (2002)

    Google Scholar 

  5. Rupa, C., Sudha Kishore, R., Avadhani, P.S.: An Advanced Authentication using Rotational Shifts. Int. Journal of Advanced Engineering and Technology 5 (2012)

    Google Scholar 

  6. Rubesh Anand, P.M., Bajpai, G., Bhaskar, V.: Real-Time Symmetric cryptography using Quaternion Julia Set. International Journal of Computer Science and network Security 9(3), 20–26 (2009)

    Google Scholar 

  7. Xiang, L., et al.: A Secure Steganographic Method via Multiple Choice Questions. Information Journal 10(5), 992–1000 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sk. Shabbeer Hussain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Hussain, S.S., Rupa, C., Avadhani, P.S., Reddy, E.S. (2014). An Advanced Authentication System Using Rotational Cryptographic Algorithm. In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II. Advances in Intelligent Systems and Computing, vol 249. Springer, Cham. https://doi.org/10.1007/978-3-319-03095-1_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03095-1_54

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03094-4

  • Online ISBN: 978-3-319-03095-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics