Open Access
Subscription Access
Strengthening of Data Security Against its Attack
This paper specifies cryptographic algorithm Hybridizing Traditional Technology (H.T.T) which may be used to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form.
The focus of the presentation will lie in presenting the symmetric and asymmetric algorithms, and specifics how it differs from each other.
We propose a new algorithm Hybridizing Traditional Technology (H.T.T) which enables us to demonstrate its security against all known types of attack. It is as fast as DES on the market leading Intel Pentium/MMX platforms (and at least as fast on many others); yet we believe it to be more secured than all other algorithms.
Use of this algorithm has improved the hardware complexity and the rate of encryption/decryption. Similarities of encryption and decryption are used to provide a high performance using an efficient architecture. The efficiency of the design is quite high due to use of short and balanced combinational paths in the design.
The focus of the presentation will lie in presenting the symmetric and asymmetric algorithms, and specifics how it differs from each other.
We propose a new algorithm Hybridizing Traditional Technology (H.T.T) which enables us to demonstrate its security against all known types of attack. It is as fast as DES on the market leading Intel Pentium/MMX platforms (and at least as fast on many others); yet we believe it to be more secured than all other algorithms.
Use of this algorithm has improved the hardware complexity and the rate of encryption/decryption. Similarities of encryption and decryption are used to provide a high performance using an efficient architecture. The efficiency of the design is quite high due to use of short and balanced combinational paths in the design.
Keywords
Asymmetric Key, Authentication, Cryptography, Digital Signature, Hash Function, Symmetric Key.
User
Font Size
Information
Abstract Views: 240
PDF Views: 0