Title :
Boolean Algebra based effective and efficient asymmetric key cryptography algorithm: BAC algorithm
Author :
Kumar, Narendra ; Gupta, Puneet ; Sahu, M. ; Rizvi, M.A.
Abstract :
The Internet was born of academic efforts to share information; it never strove for high security measures. It plays important role in becoming people online, this mode is easy and effective but dangerous too in terms of data hacking and cracking by unauthorized persons. It is needed that while using Internet data must be secured and personal. Encryption can be used to protect data in transit, for example data being transferred via network (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks. Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication codes (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. In this paper an attempt is made to develop new encryption and decryption algorithm and implemented in Java, it gives very encouraging results in small as well as in large data files.
Keywords :
Boolean algebra; Java; computer crime; cryptography; digital signatures; BAC algorithm; Bluetooth device; Boolean algebra cryptography; Internet data; Java; MAC; asymmetric key cryptography algorithm; bank automatic teller machine; cryptographic software; data cracking; data file; data hacking; data protection; decryption algorithm; digital signature; e-commerce; encryption algorithm; message authentication code verification; message authenticity; message confidentiality; message integrity; mobile telephone; security measures; system design; unauthorized person; wireless intercom system; wireless microphone; Algorithm design and analysis; Ciphers; Encryption; Internet; Public key; BAC Algorithm (Boolean Algebra Cryptography); Complement; Cryptography; Decryption; Encryption; MAC (Message Authentication Code); Unicode; XOR operation;
Conference_Titel :
Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on
Conference_Location :
Kottayam
Print_ISBN :
978-1-4673-5089-1
DOI :
10.1109/iMac4s.2013.6526417