Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Improving Security of Randomized Arithmetic Code with RPB Techniques


Affiliations
1 Department of Computer Science and Engineering, Karunya University, India
     

   Subscribe/Renew Journal


We propose randomized arithmetic code (RAC) with rotation in partitioned bit stream (RPB) technique. In this technique we improve more security. The RAC intends for the random order of the intervals associated with the symbols. RPB which further executes a random rotation to the output of the final bit stream. In the proposed technique, we used only less amount of time taken. The proposed technique RAC with RPB takes only less computational overhead and reduce the wastage of time. Here, in each and every step it does not take the XOR operation. The security analysis in the proposed scheme can resist the cipher-text attacks. By using this technique, against from the cipher-text only attacks.


Keywords

Arithmetic Codes, Cryptanalysis, Randomized Arithmetic Codes, And Rotation in Partition Bit Streams.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 231

PDF Views: 1




  • An Improving Security of Randomized Arithmetic Code with RPB Techniques

Abstract Views: 231  |  PDF Views: 1

Authors

Nirmal J. Mangaly
Department of Computer Science and Engineering, Karunya University, India
Iwin Joseph Thanakumar
Department of Computer Science and Engineering, Karunya University, India

Abstract


We propose randomized arithmetic code (RAC) with rotation in partitioned bit stream (RPB) technique. In this technique we improve more security. The RAC intends for the random order of the intervals associated with the symbols. RPB which further executes a random rotation to the output of the final bit stream. In the proposed technique, we used only less amount of time taken. The proposed technique RAC with RPB takes only less computational overhead and reduce the wastage of time. Here, in each and every step it does not take the XOR operation. The security analysis in the proposed scheme can resist the cipher-text attacks. By using this technique, against from the cipher-text only attacks.


Keywords


Arithmetic Codes, Cryptanalysis, Randomized Arithmetic Codes, And Rotation in Partition Bit Streams.