CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

RSU Algorithm for Secured Communication

Published on August 2012 by Sunil Shirsat, Swapnil Sanap
International Conference on Intuitive Systems and Solutions 2012
Foundation of Computer Science USA
ICISS - Number 1
August 2012
Authors: Sunil Shirsat, Swapnil Sanap
c574dbb2-b765-4a4e-8a52-cd89288091cd

Sunil Shirsat, Swapnil Sanap . RSU Algorithm for Secured Communication. International Conference on Intuitive Systems and Solutions 2012. ICISS, 1 (August 2012), 34-37.

@article{
author = { Sunil Shirsat, Swapnil Sanap },
title = { RSU Algorithm for Secured Communication },
journal = { International Conference on Intuitive Systems and Solutions 2012 },
issue_date = { August 2012 },
volume = { ICISS },
number = { 1 },
month = { August },
year = { 2012 },
issn = 0975-8887,
pages = { 34-37 },
numpages = 4,
url = { /proceedings/iciss/number1/7956-1008/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Intuitive Systems and Solutions 2012
%A Sunil Shirsat
%A Swapnil Sanap
%T RSU Algorithm for Secured Communication
%J International Conference on Intuitive Systems and Solutions 2012
%@ 0975-8887
%V ICISS
%N 1
%P 34-37
%D 2012
%I International Journal of Computer Applications
Abstract

The essential aspect of secured communications is secret key cryptography. The key selection mechanism and the encoding methodology determine the efficiency of the cipher text generated. In this paper, RSU algorithm is proposed which encodes the message by using reversible Boolean functions and combinatory. In this method, same keys are used for both encryption and decryption. The plaintext and secret keys are modified before encryption. This increases the complexity of deciphering the cipher text by intruders. Thereby it provides extremely better security for data.

References
  1. Andrew S. Tanenbaum , "Computer Networks" (4th Edition), Prentice Hall PTR
  2. BANGALORE G. Tilak, JAIN Vinod Kumar, HEBBAR K. Shreedhar ,"Enciphered Data Steganography Using Secret Key" JEEE, University of Oradea Publisher, Volume 3, Number 2, October 2010
  3. Behrouz A. Forouzan, "Cryptography and Network Security", Special Indian Edition 2007, Tata McGraw-Hill Publication
  4. C. H. Bennett,1973. Logical reversibility of computation, IBMJ. Research and evelopment,17: 525532.
  5. C. H. Bennett. "The thermodynamics of computation – A Review",International journal of Theoretical Physics, 21:905-928,1982.
  6. http://en. wikipedia. org/wiki/Magic_square
  7. M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information. Cambridge, U. K. : Cambridge Univ. Press, Dec. 2000.
  8. Robert Wille, Rolf Drechsler "Towards a Design Flow for Reversible Logic", (9-13). Shreedhar H. K. et al. / International Journal of Engineering Science and Technology (IJEST)
Index Terms

Computer Science
Information Sciences

Keywords

Combinatorics Cryptography Decryption Encryption Reversible Gates Rsu Algorithm Secret Key