Abstract
Today, Cryptographic schemes play a major role in storage, retrieval and transfer of data and code in a secured manner. The major factors which determine the efficiency of a cryptographic system are computational speed, level of security provided, cost effectiveness and key size of the algorithm. Choosing the optimal bit size for keys in encryption and decryption algorithm is necessary for the efficient computation of the algorithm and bit size of the key is directly proportional to the complexity of the algorithm and in turn cost of the encryption and decryption algorithm. In this paper, we propose a novel cost-effective small key size symmetric key algorithm which is suitable to all sizes of data and all kinds of data such as audio and video because of its low key size and high computational speed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sarker, M.Z.H., Parvez, M.S.: A Cost Effective Symmetric Key Cryptographic Algorithm for Small Amount of Data. In: 9th International Multitopic Conference, IEEE INMIC (2005)
Kumar, R.S., Pradeep, E., Naveen, K., Gunasekaran, R.: A Novel Approach for Enciphering Data of Smaller Bytes. International Journal of Computer Theory and Engineering 2(4) (August 2010)
Performance Analysis of Data Encryption Algorithms, http://www1.cse.wustl.edu/~jain/cse567-6/ftp/encryption_perf/index.html
Elminaam, D.S.A., Kader, A.M.A., Hadhoud, M.M.: Performance Evaluation of Symmetric Encryption Algorithms. IJCSNS International Journal of Computer Science and Network Security 8(12) (December 2008)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy. IEEE Press (2003)
Liu, J.K., Au, M.H., Susilo, W.: Self-generated certificate public key cryptography and certificateless signature/encryption scheme in the standard model. In: ACM Symposium on Information, Computer and Communications Security. ACM Press (2007)
Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: IEEE International Conference on Sensor and Ad Hoc Communications and Networks. IEEE Press (2004)
Deng, J., Han, Y.S.: Multipath Key Establishment for Wireless Sensor Networks Using Just-enough Redundancy Transmission. IEEE Transactions on Dependable and Secure Computing (2008)
Boris, K., Markus, D.: A Provably Secure And Efficient Countermeasure Against Timing Attacks. In: IEEE Computer Security Foundations Symposium. IEEE Computer Society (2009)
Massey, J.L.: Guessing and Entropy. In: IEEE Symposium on Information Theory. IEEE Computer Society (1994)
Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. In: IEEE International Conference on Network Protocols. IEEE Press (2003)
MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.J.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers (1985)
Kumar, K., Begum, J.N., Sumathy, V.: Efficient Region-Based Class Key Agreement Protocols for Ad Hoc Networks using Elliptic Curve Cryptography. In: IEEE International Advance Computing Conference. IEEE Press (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Kannan, Y.R.A., Prasad, S.A., Varalakshmi, P. (2012). Cognitive Symmetric Key Cryptographic Algorithm. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Computer Science and Engineering. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 85. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27308-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-27308-7_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27307-0
Online ISBN: 978-3-642-27308-7
eBook Packages: Computer ScienceComputer Science (R0)