Abstract
In Symmetric Key Cryptography domain, Automatic Variable Key (AVK) approach is in inception phase because of unavailability of reversible XOR like operators. Fibonacci-Q matrix has emerged as an alternative solution for secure transmission with varying key for different sessions [3, 10]. This paper attempts to analyze symmetric key cryptography scheme based on AVK approach. Due to key variability nature, the AVK approach is assumed to be more powerful, efficient and optimal but its analysis from hackers’ point of view is demonstrated in this paper. This paper also assumes various situations under which mining of future keys can be achieved. The paper also discusses concept of Key variability with less probability of extracted result under various scenario with the different degree of difficulty in key mining.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Prajapat, S., Jain, A., Thakur, R.S.: A Novel Approach For Information Security With Automatic Variable Key Using Fibonacci Q-Matrix. IJCCT 3(3), 54–57 (2012)
Nalli, A.: On the Hadamard Product of Fibonacci Q n matrix and Fibonacci Q−n matrix. International Journal of Contemporary Mathematical Sciences 1(16), 753–761 (2006)
Chakrabarti, P., Bhuyan, B., Chowdhuri, A., Bhunia, C.: A novel approach towards realizing optimum data transfer and Automatic Variable Key (AVK) in cryptography. IJCSNS 8(5), 241 (2008)
Prajapat, S., Thakur, R.S.: Time variant approach towards symmetric key, SAI 2013, pp. 398–405. IEEE
Diffe, W., Hellman, M.: Exhaustive Cryptanalysis of the NBS Data encryption standard. IEEE Computer, 74–84, June 1977
Chakrabarti, P.: Application of Automatic Variable Key (AVK) in RSA. International Journal HIT Transactions on ECCN 2(5)
Bhunia, C.T.: Application of AVK and selective encryption in improving performance of quantum cryptography and network (2006)
Blaze, M., Diffie, W., Rivest, R.L., Schneier, B., Shimomura, T., Thompson, E., Wiener, M.: Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security. A Report by an Ad Hoc Group of Cryptographers and Computer Scientists (1996)
Stakhov, A.P.: Fibonacci matrices, a generalization of the ‘Cassini formula’, and a new coding theory. Chaos, Solutions & Fractals 30(1), 56–66 (2006)
Fernández1, M., Diaz1, G., Cosme1, A., Negrón, I., Negrón, P., Alfredo: Cryptography: algorithms and security applications. The IEEE Computer Society’s Student 8(2), Fall 2008
Nadeem, A., Javed, M.Y.: A performance comparison of data encryption algorithms. Information and Communication Technologies, ICICT 2005, pp. 84–89 (2005)
Elminaam, D.S.A., Hadhoud, M.M., Abdul Kader, H.M.: Performance Evaluation of Symmetric Encryption Algorithm. IJCSMS 8(12), 58–64 (2008)
Elminaam, D., Kader, H., Hadhoud, M.: Performance Evaluation of Symmetric Encryption Algorithms on Power Consumption for Wireless Devices. International Journal of Computer Theory and Engineering 1(4), 1793–8201 (2009)
Prajapat, S., Saxena, S., Jain, A., Sharma, P.: Implementation of information security with Fibonacci-Q matrix. In: Proceeding of International Conference ICICIS-2012 and International Journal of Electronics Communication and Computer Engineering, ISSN (Online): 2249-071 62575/BPL/CE/2012
Prajapat, S., Thakur, R.S.: Sparse approach for realizing AVK for Symmetric Key Encryption. IJRDET & proceeding of International Research Conference on Engineering, Science and Management (IRCESM 2014), vol. 2, pp. 15–18
Ross, S.M.: Introduction to Probability models, 10th edn., pp. 191–268
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Prajapat, S., Thakur, R.S. (2015). Markov Analysis of AVK Approach of Symmetric Key Based Cryptosystem. In: Gervasi, O., et al. Computational Science and Its Applications -- ICCSA 2015. ICCSA 2015. Lecture Notes in Computer Science(), vol 9159. Springer, Cham. https://doi.org/10.1007/978-3-319-21413-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-21413-9_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21412-2
Online ISBN: 978-3-319-21413-9
eBook Packages: Computer ScienceComputer Science (R0)