Skip to main content

Abstract

Today, Cryptographic schemes play a major role in storage, retrieval and transfer of data and code in a secured manner. The major factors which determine the efficiency of a cryptographic system are computational speed, level of security provided, cost effectiveness and key size of the algorithm. Choosing the optimal bit size for keys in encryption and decryption algorithm is necessary for the efficient computation of the algorithm and bit size of the key is directly proportional to the complexity of the algorithm and in turn cost of the encryption and decryption algorithm. In this paper, we propose a novel cost-effective small key size symmetric key algorithm which is suitable to all sizes of data and all kinds of data such as audio and video because of its low key size and high computational speed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sarker, M.Z.H., Parvez, M.S.: A Cost Effective Symmetric Key Cryptographic Algorithm for Small Amount of Data. In: 9th International Multitopic Conference, IEEE INMIC (2005)

    Google Scholar 

  2. Kumar, R.S., Pradeep, E., Naveen, K., Gunasekaran, R.: A Novel Approach for Enciphering Data of Smaller Bytes. International Journal of Computer Theory and Engineering 2(4) (August 2010)

    Google Scholar 

  3. Performance Analysis of Data Encryption Algorithms, http://www1.cse.wustl.edu/~jain/cse567-6/ftp/encryption_perf/index.html

  4. Elminaam, D.S.A., Kader, A.M.A., Hadhoud, M.M.: Performance Evaluation of Symmetric Encryption Algorithms. IJCSNS International Journal of Computer Science and Network Security 8(12) (December 2008)

    Google Scholar 

  5. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy. IEEE Press (2003)

    Google Scholar 

  6. Liu, J.K., Au, M.H., Susilo, W.: Self-generated certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: ACM Symposium on Information, Computer and Communications Security. ACM Press (2007)

    Google Scholar 

  7. Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: IEEE International Conference on Sensor and Ad Hoc Communications and Networks. IEEE Press (2004)

    Google Scholar 

  8. Deng, J., Han, Y.S.: Multipath Key Establishment for Wireless Sensor Networks Using Just-enough Redundancy Transmission. IEEE Transactions on Dependable and Secure Computing (2008)

    Google Scholar 

  9. Boris, K., Markus, D.: A Provably Secure And Efficient Countermeasure Against Timing Attacks. In: IEEE Computer Security Foundations Symposium. IEEE Computer Society (2009)

    Google Scholar 

  10. Massey, J.L.: Guessing and Entropy. In: IEEE Symposium on Information Theory. IEEE Computer Society (1994)

    Google Scholar 

  11. Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. In: IEEE International Conference on Network Protocols. IEEE Press (2003)

    Google Scholar 

  12. MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.J.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers (1985)

    Google Scholar 

  13. Kumar, K., Begum, J.N., Sumathy, V.: Efficient Region-Based Class Key Agreement Protocols for Ad Hoc Networks using Elliptic Curve Cryptography. In: IEEE International Advance Computing Conference. IEEE Press (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Kannan, Y.R.A., Prasad, S.A., Varalakshmi, P. (2012). Cognitive Symmetric Key Cryptographic Algorithm. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Computer Science and Engineering. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 85. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27308-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27308-7_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27307-0

  • Online ISBN: 978-3-642-27308-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics