Optimal Keyless Algorithm for Security

  • Insan N
  • Singh P
  • Rani S
N/ACitations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

In Modern era, every business is dependent on the Internet. The Network is growing so quickly that now at this stage no one can ever imagine anything without use of internet. But at the same time security over network is very important because of the vulnerability of data to eavesdropping. To protect the data from eavesdropping, it must be appropriately encrypted before sending over the network. There are two types of algorithms, keyed and keyless, exist to protect data. The keyed algorithms are efficient but to avoid the overhead of key generation and key management, keyless algorithms are getting popularity now days. The proposed algorithm "Optimal Keyless Algorithm for Security" represents a new way of using data itself to create a protective shield. The algorithm provides security at both character level as well as bit level. The number of rounds and the number of shifts applied at bit level are made data dependent to increase the security level, is a major advantage of the algorithm. The system is proposed with the motive to provide highest security level with minimum execution time in terms of encryption and decryption. This paper presents simulation results of proposed algorithm and its comparison with the commonly used JS keyless algorithm.

Cite

CITATION STYLE

APA

Insan, N., Singh, P., & Rani, S. (2015). Optimal Keyless Algorithm for Security. International Journal of Computer Applications, 124(10), 28–32. https://doi.org/10.5120/ijca

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free