Symmetric Encryption Algorithm Using Code Reuse Technique for Authentication Based on Needham Schroeders’ Protocol
Date
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Department of Computer Science and Information Technology
Abstract
Secure data transmission is a significant problem in human history.
Following the problem, security is one of the flourishing areas in the field
of computer science and information technology which deals with
prevention and protection of assets, both logical (data) and physical
(hardware), from unauthorized access, use, alteration, degradation,
destruction and other threats.
Many encryption algorithms have come and gone as cryptography,
cryptanalysis, and technology have progressed. Today’s communication
and computer technologies need cryptography to truly secure data in
many applications. The demands on the cryptography needed for some
commercial applications will exceed the security offered by the National
Bureau of Standards Data Encryption Standard (DES) in the near future
due to advances in technology, advances in cryptanalysis, and the
increasing rewards for breaking such a heavily used algorithm. To meet
part of this need, a new block encryption algorithm is proposed. This
algorithm is implemented using C-programming language. One way to
further increase security of encrypted data, as well as to achieve storage
and/or transmission economy, is by redundancy reduction prior to
encryption. A linguistic approach to redundancy reduction, together with
an example computer program to implement it, is given for this purpose.