Volume 4 Number 2 (Apr. 2012)
Home > Archive > 2012 > Volume 4 Number 2 (Apr. 2012) >
IJCEE 2012 Vol.4(2): 99-103 ISSN: 1793-8163
DOI: 10.7763/IJCEE.2012.V4.458

Keyless User Defined Optimal Security Encryption

Akhil Kaushik, Satvika, Manoj Barnela, and Anant Kumar

Abstract—Cryptography and encryptions, these terms are now-a-days have an unseen impact in the emerging field of network and its security. As security of data on any kind of system has became the first priority for the organization, the methods which are used to ensure security not only need to be strong and efficient, but should also be easy to execute and implemented. With progress in technology, encryption came up with a big boom, taken as a weapon of ultimate security. It is an earliest art and it is defined as the science of writing in secret code. Basically, the cryptography algorithms are categorized into two types on the basis of key management, which are key-oriented and keyless encryption algorithms. The prime goal leading the design of an encryption algorithm must provide security against unauthorized attacks. Key-oriented algorithms are very efficient but they were very bulky to manage as key handling must be done. Due to the great overhead, keyless algorithms seem an attractive option. But what about security by keyless, here is the solution- KUDOS encryption, which is a keyless security algorithm to provide ultimate security at the one level above of key- oriented.

Index Terms—Cryptography, decryption, encryption, keyless, kudos, sequence counter, user defined.

A. Kaushik is with the Department of Computer Science and Engineering, Technological Institute of Textile and Sciences, Bhiwani, Haryana, India (e-mail: akhil.kaushik@yahoo.com).
Satvika is with the Department of Information Technology, Technological Institute of Textile & Sciences, Bhiwani, Haryana, India (e-mail: satvika16oct@gmail.com).
M. Barnela is with the Department of Electronics, Technological Institute of Textile and Sciences, Bhiwani, Haryana, India (e-mail: m.barnela@gmail.com).
A. Kumar is a passed out student of Computers Engineering, Technological Institute of Textile and Sciences, Bhiwani, Haryana, India (e-mail: anant.beriwal@gmail.com).

Cite: Akhil Kaushik, Satvika, Manoj Barnela, and Anant Kumar, "Keyless User Defined Optimal Security Encryption," International Journal of Computer and Electrical Engineering vol. 4, no. 2, pp. 99-103, 2012.

General Information

ISSN: 1793-8163 (Print)
Abbreviated Title: Int. J. Comput. Electr. Eng.
Frequency: Quarterly
Editor-in-Chief: Prof. Yucong Duan
Abstracting/ Indexing: INSPEC, Ulrich's Periodicals Directory, Google Scholar, EBSCO, ProQuest, and Electronic Journals Library
E-mail: ijcee@iap.org

What's New

  • Jun 03, 2019 News!

    IJCEE Vol. 9, No. 2 - Vol. 10, No. 2 have been indexed by EI (Inspec) Inspec, created by the Institution of Engineering and Tech.!   [Click]

  • May 13, 2020 News!

    IJCEE Vol 12, No 2 is available online now   [Click]

  • Mar 04, 2020 News!

    IJCEE Vol 12, No 1 is available online now   [Click]

  • Dec 11, 2019 News!

    The dois of published papers in Vol 11, No 4 have been validated by Crossref

  • Oct 11, 2019 News!

    IJCEE Vol 11, No 4 is available online now   [Click]

  • Read more>>