Volume 4 Number 2 (Apr. 2012)
Home > Archive > 2012 > Volume 4 Number 2 (Apr. 2012) >
IJCEE 2012 Vol.4(2): 99-103 ISSN: 1793-8163
DOI: 10.7763/IJCEE.2012.V4.458

Keyless User Defined Optimal Security Encryption

Akhil Kaushik, Satvika, Manoj Barnela, and Anant Kumar

Abstract—Cryptography and encryptions, these terms are now-a-days have an unseen impact in the emerging field of network and its security. As security of data on any kind of system has became the first priority for the organization, the methods which are used to ensure security not only need to be strong and efficient, but should also be easy to execute and implemented. With progress in technology, encryption came up with a big boom, taken as a weapon of ultimate security. It is an earliest art and it is defined as the science of writing in secret code. Basically, the cryptography algorithms are categorized into two types on the basis of key management, which are key-oriented and keyless encryption algorithms. The prime goal leading the design of an encryption algorithm must provide security against unauthorized attacks. Key-oriented algorithms are very efficient but they were very bulky to manage as key handling must be done. Due to the great overhead, keyless algorithms seem an attractive option. But what about security by keyless, here is the solution- KUDOS encryption, which is a keyless security algorithm to provide ultimate security at the one level above of key- oriented.

Index Terms—Cryptography, decryption, encryption, keyless, kudos, sequence counter, user defined.

A. Kaushik is with the Department of Computer Science and Engineering, Technological Institute of Textile and Sciences, Bhiwani, Haryana, India (e-mail: akhil.kaushik@yahoo.com).
Satvika is with the Department of Information Technology, Technological Institute of Textile & Sciences, Bhiwani, Haryana, India (e-mail: satvika16oct@gmail.com).
M. Barnela is with the Department of Electronics, Technological Institute of Textile and Sciences, Bhiwani, Haryana, India (e-mail: m.barnela@gmail.com).
A. Kumar is a passed out student of Computers Engineering, Technological Institute of Textile and Sciences, Bhiwani, Haryana, India (e-mail: anant.beriwal@gmail.com).

Cite: Akhil Kaushik, Satvika, Manoj Barnela, and Anant Kumar, "Keyless User Defined Optimal Security Encryption," International Journal of Computer and Electrical Engineering vol. 4, no. 2, pp. 99-103, 2012.

General Information

ISSN: 1793-8163
Frequency: Semiyearly
Editor-in-Chief: Prof. Yucong Duan
Abstracting/ Indexing: EI (INSPEC, IET), Ulrich's Periodicals Directory, Google Scholar, EBSCO, ProQuest, and Electronic Journals Library
E-mail: ijcee@iap.org

What's New

  • Apr 02, 2018 News!

    IJCEE Vol. 10, No. 1 is available online now.   [Click]

  • Jan 05, 2018 News!

    IJCEE Vol. 9, No. 2 is available online now.   [Click]

  • Jul 27, 2017 News!

    IJCEE Vol. 9, No. 1 is available online now.   [Click]

  • Jun 29, 2017 News!

    IJCEE Vol. 7, No. 6 has been indexed by EI (Inspec) Inspec, created by the Institution of Engineering and Tech.!   [Click]

  • Jun 29, 2017 News!

    IJCEE Vol. 7, No. 5 has been indexed by EI (Inspec) Inspec, created by the Institution of Engineering and Tech.!   [Click]

  • Read more>>