DOI QR코드

DOI QR Code

AVK based Cryptosystem and Recent Directions Towards Cryptanalysis

  • Received : 2016.05.09
  • Accepted : 2016.06.15
  • Published : 2016.10.31

Abstract

Cryptanalysis is very important step for auditing and checking strength of any cryptosystem. Some of these cryptosystem ensures confidentiality and security of large information exchange from source to destination using symmetric key cryptography. The cryptanalyst investigates the strengths and identifies weakness key as well as enciphering algorithm. With increase in key size the time and effort required to guess the correct key increases so trend is increase key size from 8, 16, 24, 32, 56, 64, 128 and 256 bits to strengthen the cryptosystem and thus algorithm continues without compromise on the cost of time and computation. Automatic Variable Key (AVK) approach is an alternative to the approach of fixing up key size and adding security level with key variability adds new dimension in the development of secure cryptosystem. Likewise, whenever any new cryptographic method is invented to replace per-existing vulnerable cryptographic method, its deep analysis from all perspectives (Hacker / Cryptanalyst as well as User) is desirable and proper study and evaluation of its performance is must. This work investigates AVK based cryptic techniques, in future to exploit benefits of advances in computational methods like ANN, GA, SI etc. These techniques for cryptanalysis are changing drastically to reduce cryptographic complexity. In this paper a detailed survey and direction of development work has been conducted. The work compares these new methods with state of art approaches and presents future scope and direction from the cryptic mining perspectives.

Keywords

References

  1. Prajapat Shaligram, D. Rajput, R. S. Thakur, "Time variant approach towards symmetric key", In proceedings of IEEE Science and Information Conference (SAI), pp.398-405, 2013.
  2. R. S. Goswami ,S. K. Chakraborty ,A. Bhunia ,C. T. Bhunia," New Approach towards Generation of Automatic Variable Key to Achieve Perfect Security", in Proc. of Information Technology: New Generations (ITNG), pp. 489-491, 2013.
  3. B. Bhuyan, P. Chakrabarti, A. Chowdhuri, F. Masulli, C. T. Bhunia, " Implementation of Automatic Variable Key with Chaos Theory and Studies Thereof", The IUP Journal of Computer Sciences, Vol. 5(4), pp. 22-32, 2011.
  4. R.S. Goswami ,S. K. Chakraborty,A. Bhinia ,C. T. Bhunia," Various New Methods of Implementing AVK", in Proc. of 2nd International Conference on Advances in Computer Science and Engineering, 2013.
  5. R. S. Goswami, S. K. Chakraborty, A, b. Bhinia, C. T. Bhunia, "Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison", International Journal of Computer Applications, Vol. 82(1), 2013.
  6. P. Chakraborty, C.T. Bhunia, B. Bhuyan, "Variable Key: A new investigation in cryptography and results thereof", IJITKM, 2012.
  7. Oliveira C., Jose A., and Carlos A. C., "Clustering and categorization applied to cryptanalysis", Cryptologia, Vol. 30(3), pp. 266-280, 2006. https://doi.org/10.1080/01611190600694457
  8. H. H. Ngo, X. Wu, P. D. Le, C. Wilson, and B. Srinivasan, "Dynamic Key Cryptography and Applications", In Proc. of International Journal of Network Security, Vol. 10(3), pp. 161-174, 2010.
  9. Prajapat Shaligram, Sharma A., Swami S., Rajput D., Singroli B., R. S. Thakur, "Sparse approach for realizing AVK for Symmetric Key Encryption", International Journal of Recent Development in Engineering and Technology (IJRDET), Vol. 2(4), pp. 15-18, 2014.
  10. Prajapat Shaligram, A. Jain and R. S. Thakur, "A Novel Approach For Information Security With Automatic Variable Key Using Fibonacci Q-Matrix", International Journal of Computer & Communication Technology (IJCCT).
  11. A. p. Singh, S. Kumar, "A new method for generation of variable session keys", International Journal Of Scientific Research And Education IJSAE, Vol. 2(8), pp. 1578-1581, 2014.
  12. P. Chakrabarti, B Bhuyan, A. Chowdhuri, C.T.Bhunia, "Novel approach towards realizing optimum data transfer and Automatic Variable Key(AVK) in cryptography", International Journal of Computer Science and Network Security, Vol. 8(5), pp. 241-250, 2008.
  13. G. E. Pickard, R. I. Khazan, B. W. Fuller, J. A. Cooley,"DSKE: Dynamic Set Key Encryption analyze the performance of DSKE", MIT Lincoln Laboratory,244 Wood St Lexington MA, 02451,pp. 1-7, 2012.
  14. Prajapat Shaligram, Saxena S., Jain A. and Sharma P.," Implementation of Information Security with Fibonacci Q-Matrix", in proceedings of ICICS-2012 and Special Issue of IJECCE, pp. 118-124, 2012.
  15. R. S. Goswami, S. K. Chakraborty, A. Bhunia, C. T. Bhunia, "Generation of Automatic Variable Key under Various Approaches in Cryptography System", Journal of the Institution of Engineers (India): Series B, Vol. 94(4), pp. 215-220, 2013. http://dx.doi.org/10.1007/s40031-013-0066-8
  16. Prajapat Shaligram, R. S. Thakur, "Optimal Key Size of the AVK for Symmetric Key Encryption." In Covenant Journal of Information & Communication Technology , Vol.3(2), pp. 71-81, 2015 .
  17. Prajapat Shaligram, R. S. Thakur "Cryptic-Mining: Association Rules Extractions Using Session Log", In proceedings of Computational Science and Its Applications ICCSA 2015, pp. 699-711, 2015. http://dx.doi.org/10.1007/978-3-319-21410-8_53
  18. Prajapat Shaligram, R. S. Thakur. "Markov Analysis of AVK Approach of Symmetric Key Based Cryptosystem." In proceedings of Computational Science and Its Applications ICCSA 2015, pp. 164-176, 2015. http://dx.doi.org/10.1007/978-3-319-21413-9_12
  19. Prajapat Shaligram, A. Thakur, K. Maheshwari and R. S.Thakur, "Cryptic Mining in Light of AI", in proc. of International Conference On Advances In Computing, Control And Networking - ACCN 2015, Vol. 5(2), pp. 131-135, 2015.
  20. Prajapat Shaligram, K. Maheshwari, A.Thakur and R.S.Thakur, "Cryptic Mining in light of Artificial Intelligence", International Journal of Advanced Computer Science and Applications(IJACSA), Vol. 6(8), pp. 62-69, 2015. http://dx.doi.org/10.14569/IJACSA.2015.060808
  21. Prajapat Shaligram, G. Parmar and R. S. Thakur, "Investigation for Efficient Cryptosystem Using SGcrypter", proc. of ICCP 2015 and IJAER, Vol. 79(10), pp. 853-858, 2015. http://dx.doi.org/10.5120/ijca2015906518
  22. Prajapat Shaligram and R.S.Thakur, "Various approaches towards cryptanalysis", IJCA, Vol. 127(14),pp.15-24, October 2015.
  23. Prajapat Shaligram, R. S. Thakur, "Cryptic Mining for Automatic Variable Key Based Cryptosystem", Elsevier Procedia Computer Science, Vol.78, pp. 199-209, 2016. http://dx.doi.org/10.1016/j.procs.2016.02.034
  24. Prajapat Shaligram, R. S. Thakur, "Realization of information exchange with Fibo-Q based Symmetric Cryptosystem", International Journal of Computer Science and Information Security, IJCSIS, Vol. 14(2), pp. 216-223, 2016.
  25. Prajapat Shaligram, R. S. Thakur, "Cryptic Mining: Apriori Analysis of Parameterized Automatic Variable Key based Symmetric Cryptosystem", International Journal of Computer Science and Information Security, IJCSIS, Vol. 14(2), pp. 233-246, 2016.
  26. Prajapat Shaligram, R.S. Thakur, "Key Diffusion Approach for AVK based Cryptosystem", Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies,(ICTCS -16), 78, 2016. http://dx.doi.org/10.1145/2905055.2905288