Skip to main content

Generation of Automatic Variable Key to Make Secure Communication

  • Conference paper
  • First Online:

Abstract

By the modernization of computer technology, the possibility of various cryptanalytic attacks increases rapidly, due to which maintaining the confidentiality on insecure channel becomes the burning problem and makes a large arena for the researchers. To tackle such problems and provide suitable solution, many methods have been introduced out of which automatic variable key (AVK) is the most dominated mechanisms as found in theoretical survey. In this paper, we have proposed a new scheme in AVK to generate the sequence of keys on the basis of divisibility factor of previous key. To prove the fruitfulness of our proposed scheme, we have compared our scheme with the existing related schemes based on randomness and standard deviation among the successive keys.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Shannon, C.E.: Mathematical theory of communication. Bell Syst. Tech. J. 27(379–423), 623–656 (1984)

    MathSciNet  MATH  Google Scholar 

  2. Shannon, C.E.: Communication theory of secrecy system. Bell Syst. Tech. J. 28, 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  3. Bhunia, C.T.: New approaches for selective AES towards tackling error propagation effect of AES. Asian J. Inf. Technol. 5990, 1017–1022 (2006)

    Google Scholar 

  4. Bhunia, C.T.: Information Technology, Network and Internet. New Age publication

    Google Scholar 

  5. Bhunia, C.T., Mondal, G., Samaddar, S.: Theories and application of time variant key in RSA and that with selective encryption in AES. In: Proceedings of the EAIT, pp. 219–221. Elsevier, Calcutta (2006)

    Google Scholar 

  6. Chakraborti, P., Bhuyan, B., Chowdhuri, A., Bhunia, C.T.: A novel approach towards realizing optimum data transfer and automatic variable key (AVK). Int. J. Comp. Sci. Netw. Secur. 8(5), 241 (2008)

    Google Scholar 

  7. Konar, C., Bhunia, C.T.: A novel approach towards realizing optimum data transfer and AVK in cryptography. Int. J. Comp. Sci. Netw. Secur. 8(5), 241–250 (2008)

    Google Scholar 

  8. Goswami, R.S., Chakraborty, S.K., Bhunia, A., Bhunia, C.T.: Generation of automatic variable key under various approaches in cryptography system. J. Inst. Eng. India Ser. B 94(4), 215–220 (2014)

    Article  Google Scholar 

  9. Goswami, R.S., Chakraborty, S.K., Bhunia, A., Bhunia, C.T.: Approach towards optimum data transfer with various automatic variable key techniques to achieve perfect security with analysis and comparison. Int. J. Comput. Appl. 82(1), 28–32 (2013)

    Google Scholar 

  10. Goswami, R.S., Chakraborty, S.K., Bhunia, A., Bhunia, C.T.: Various new methods of implementing AVK. In: 2nd International Conference on Advances in Computer Science and Engineering, pp. 149–152 (2013)

    Google Scholar 

  11. Banerjee, S., Dutta, M.P., Bhunia, C.T.: A New three dimensional based key generation technique in AVK. Commun. J. Inst. Eng. India Ser. B

    Google Scholar 

  12. Banerjee, S., Dutta, M.P., Bhunia, C.T.: A novel approach to achieve the perfect security through AVK over insecure communication channel. Commun. J. Inst. Eng. India Ser. B

    Google Scholar 

  13. Dutta, M.P., Banerjee, S., Bhunia, C.T.: An approach to generate 2-Dimensional AVK to enhance security of shared information. Int. J. Sec. Appl. 9(10), 147–154 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bishal Kumar Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Singh, B.K., Subhasish Banerjee, Dutta, M.P., Bhunia, C.T. (2016). Generation of Automatic Variable Key to Make Secure Communication. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_36

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2638-3_36

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2636-9

  • Online ISBN: 978-81-322-2638-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics