AN ENCRYPTION AND AUTHENTICATION ALGORITHM DEVELOPED BASED ON THE ONE – TIME PAD CIPHER

264 views

Authors

Keywords:

Symmetric-key cryptography; Symmetric-key cryptographic algorithm; Symmetric-key cryptosystems; One - time pad algorithm; OTP cipher.

Abstract

An encryption and authentication algorithm developed based on the One – Time Pad (OTP) cipher are proposed. Advantages of the new algorithm is to have high safety and efficient implementation as OTP cipher, but the establishment, management - distribution and usage of keys are exactly the same as the Symmetric-key cryptosystems in practice (DES,AES, etc.)

References

[1]. SharadPatil , Ajay Kumar (2010). "Effective Secure Encryption Scheme(One Time Pad) using Complement Approach". International Journal of Computer Science & Communication, Vol.1,No.1,January-June 2010, pp.229-233.

[2]. Raman Kumar,Roma Jindal, Abhinav Gupta , SagarBhalla, HarshitArora (2011). "A Secure Authentication System-Using Enhanced One Time Pad Technique". IJCSNS International Journal of Computer Science and Network Security,VOL.11 No.2,February 2011.

[3]. SharadPatil ,ManojDevare , Ajay Kumar (2007). "Modified One Time Pad Data Security Scheme: Random Key Generation Approach". International Journal of Computer Science and Security (IJCSS) ,Volume (3): Issue(2).

[4]. N.J.Croft and M.S.Olivier (2005). “Using an approximated One-Time Pad to Secure ShortMessaging service(SMS)”. SATNAC 2005 Proceedings.

[5]. Jeff Connelly (1978). "A Practical Implementation of a One-time Pad Cryptosystem". CPE 456 , June 11, 2008.

[6]. Shannon C.E. (1949). "Communication Theory of Secrecy Systems". Bell System Technical Journal, Vol.28-4, pp 656-715.

[7]. William Stallings (2005). "Cryptography and Network Security Principles and Practices". Prentice Hall.

[8]. FIPS PUB 197: "Federal information processing standards publication 197". Category: computer security standard, cryptography. November 2001.

[9]. Menezes A., Van Oorschot P. and Vanstone S. (1996). "Handbook of Applied Cryptography". Boca Raton, Florida: CRC Press.

[10]. D. Coppersmith, H. Krawczyk, and Y. Mansour, “The shrinking generator,” in CRYPTO ’93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology, (New York, NY, USA), pp. 22–39, Springer-Verlag New York, Inc., 1994.

Published

15-12-2020

How to Cite

Lưu Hồng Dũng. “AN ENCRYPTION AND AUTHENTICATION ALGORITHM DEVELOPED BASED ON THE ONE – TIME PAD CIPHER”. Journal of Military Science and Technology, no. csce4, Dec. 2020, pp. 87-93, https://online.jmst.info/index.php/jmst/article/view/324.