{"title":"Introducing a Platform for Encryption Algorithms","authors":"Ahmad Habibizad Navin, Yasaman Hashemi, Omid Mirmotahari","volume":14,"journal":"International Journal of Computer and Information Engineering","pagesStart":336,"pagesEnd":339,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/6245","abstract":"In this paper, we introduce a novel platform\r\nencryption method, which modify its keys and random number\r\ngenerators step by step during encryption algorithms. According to\r\ncomplexity of the proposed algorithm, it was safer than any other\r\nmethod.","references":"[1] U. D. Block, \"Data Communication and Distributed Networks\", Reston\r\nBlock, 1992.\r\n[2] J .E. Ettinger, \"Information Security\", Chapman & Hall, 1993.\r\n[3] Charles P. Pfleeger, \"Security in Computing\", Prentice Hall, 1989\r\nWilliam L. Schweber. \"Data Communication\", MC Grew-Hill 1988.\r\n[4] D. Elizabeth, R. Denning, \"Cryptography and Data Security \", Addition\r\n- Wesley 1983W.-K. Chen, Linear Networks and Systems (Book style).\r\nBelmont, CA: Wadsworth, 1993, pp. 123-135.\r\n[5] Yongdae Kim, ''PRNG, Block and Stream'' September 4, 2001.\r\n[6] Prof. Benny Chor, \"Introduction to Modern Cryptography\", School of\r\nComputer Science, 1987.\r\n[7] Mitchell Chris J., \"Some Observation on the Bit _ Search Generator\",\r\nTechnical Report RHUL - MA- 2004-3, 20 October 2004.\r\n[8] K. C. Zeng, C. H. Yang, D. Y. Wei , and T. R. N. Rao, \" Pseudo\r\nRandom Bit Generators in Stream - Cipher Cryptography \" , IEEE\r\nComputer , February 1991 , PP. 8-17.\r\n[9] Chris J. Mitchell, Alexander W. Dent, \"International Standards for\r\nStream Cipher\", Information Security Group, Royal Holloway,\r\nUniversity of London, 1998.\r\n[10] A. Menezes, P. Van Oorschot, S. Vanstone, \"Block Cipher\", CRC Press,\r\n1996, www.cacr.math.uwaterloo.ca\/hac.\r\n[11] Kim Yongdae, PRNG, \"Block and Stream Cipher\", September 4, 2002.\r\n[12] Nguyen Cao Dat, ''Network Security'', dat@dit.hcmut.edu.vn.\r\n[13] C. Chan, J. M. Eng, \"Global Corporate Communications with Integrated\r\nServices Digital Networks\", International Journal of Satellite\r\nCommunications, Vol .9 No.5, Sep- Oct 1991, pp.267- 277.\r\n[14] Chung-Ping Wu and C. C. Jay Kuo, \"Design of integrated multimedia\r\nCompression and encryption systems,\" IEEE Transactions on\r\nMultimedia, vol. 7, no. 5, 2005, pp. 828-839.\r\n[15] S. H. Jensen, P. C. Hansen, S. D. Hansen, and J. Aa. Sr\u2518\u00e6ensen,\r\n\"Reduction of broad-band noise in speech by truncated qsvd,\" IEEE\r\nTransactions on Speech and Audio Processing, vol. 46, no. 6, 1995, pp.\r\n1737-1741.\r\n[16] P. C. Hansen and S. H. Jensen, \"FIR filter representations of reduce-rank\r\nnoise reduction,\" IEEE Transactions on Signal Processing, vol. 46,\r\n1998, pp. 1737-1741.\r\n[17] Zou Jian-cheng, Tie Xiao-yun. Arnold transformation of digital image\r\nwith two- dimensions and its periodicity [J]. Journal of North China\r\nUniversity of Technology, 2000, pp. 12-15.\r\n[18] Yang Ya-li, CAI Na, NI Guo-qiang. Digital image scrambling\r\ntechnology based on the symmetry of Arnold transform. Journal of\r\nBeijing Institute of Technology, 2006, Vol.15, No.2: pp. 216-220.\r\n[19] Chen Ming, PING Xi-jian. Image steganography based on Arnold\r\ntransform. Computer application research, 1, 2006, pp. 235-238.\r\n[20] F. Autrusseau, JP. Guedon, and Y. Bizais, \"Watermarking and\r\ncryptographic schemes for medical imaging,\" in SPIE Medical Imaging,\r\n2003, pp. 532-105.\r\n[21] F. Autrusseau, B. Parrein, and M. Servieres, \"Lossless compression\r\nbased on a discrete and exact radon transform: A preliminary study,\" in\r\nICASSP, 2006, pp. 466 - 468.\r\n[22] G. Bertoni, L. Breveglieri, I. Koren, P. Maistri, and V. Piuri, \"Error\r\nAnalysis and Detection Procedures for a Hardware Implementation of\r\nthe Advanced Encryption Standard,\" IEEE Trans. on Computers, vol.\r\n52, no. 4, April 2003, pp. 492-505.\r\n[23] G. Bertoni, L. Breveglieri, I. Koren, and P. Maistri, \"An Efficient\r\nHardware-based Fault Diagnosis Scheme for AES: Performances and\r\nCost,\" In Proc. of DFT2004, Oct. 2004, pp. 130-138.\r\n[24] L. Breveglieri, I. Koren, and P. Maistri, \"Incorporating Error Detection\r\nand Online Reconfiguration into a Regular Architecture for the\r\nAdvanced Encryption Standard,\" In Proc. of the DFT2005, Oct. 2005,\r\npp. 72-80.\r\n[25] K. Wu, R. Karri, G. Kuznetsov, and M. Goessel, \"Low Cost Concurrent\r\nError Detection for the Advanced Encryption Standard,\" In Proc. of the\r\n2004 International Test Conference, Oct. 2004, pp. 1242-1248.","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 14, 2008"}