Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

A Secure License Key Generation using FBPS

by Fatangare Sonal, Taksal Ashwini, Todmal Satish.r.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 24
Year of Publication: 2015
Authors: Fatangare Sonal, Taksal Ashwini, Todmal Satish.r.
10.5120/20703-3529

Fatangare Sonal, Taksal Ashwini, Todmal Satish.r. . A Secure License Key Generation using FBPS. International Journal of Computer Applications. 117, 24 ( May 2015), 19-23. DOI=10.5120/20703-3529

@article{ 10.5120/20703-3529,
author = { Fatangare Sonal, Taksal Ashwini, Todmal Satish.r. },
title = { A Secure License Key Generation using FBPS },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 24 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 19-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number24/20703-3529/ },
doi = { 10.5120/20703-3529 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:17.782203+05:30
%A Fatangare Sonal
%A Taksal Ashwini
%A Todmal Satish.r.
%T A Secure License Key Generation using FBPS
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 24
%P 19-23
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Secure message transmission is generally required for the system where transmitted message need to be verified at the receiver end. Fibonacci develops the reversible encryption algorithms as mentioned in below technique. The technique considers a message as binary string on which the Fibonacci Based Position Substitution (FBPS) method is applied. A block of n bits is taken as an input stream from a continuous stream of bits. The decimal equivalent value of a source block is obtain and finds its position on the Fibonacci series, on a number or in between two numbers. The source value is mapped on a previous number of the series called target number. For proper one-one mapping a scheme is applied on the target number. This target number is again projected on a previous number and so on until the target number reached in a 0 or 1. Each time of the projection a 0 or 1 is produced. Plain text is encrypted for different block sizes as per the specification of a session key of a session to generate the final encrypted stream. Comparison of the proposed technique with existing and industrially accepted RSA and Triple DES.

References
  1. J. K. Mandal, Mangalmay Das, 2009 "Fibonacci Based Position Substitution (FBPS) Encoder for Secured Message Transmission" Proceedings of IEEE International Advance Computing Conference (IACC 2009) Patiala, India, 6-7 March 2009.
  2. B Mandal, J. K. Paul, M. , 08th 09th February 2008 "A Permutative Cipher Technique (PCT) to Enhance the Security of Network Based Transmission", Procedings of 2nd National Conference on Computing for Nation Development, Bharati Vidyapeeth's Institute of Computer Applications and Management, New Delhi,, pp. 197-202,.
  3. D. Welsh, 1988 "Codes and Cryptography", Oxford; Claredon Press.
  4. RSA Vulnerabilities", Journal of Cryptology, vol 10, pp 233-260, 1997.
  5. DES:http://en. wikipedia. org/wiki/Data_Encryption_Standard.
  6. TDES: http://en. wikipedia. org/wiki/Triple_DES
  7. RSA:http://en. wikipedia. org/wiki/Rsa_algorithm
Index Terms

Computer Science
Information Sciences

Keywords

Fibonacci Based Position Substitution (FBPS) Technique cipher bit blocks cipher Session Key Plug-in license key algorithm.