Read moreĪ public key encryption scheme is said to be n-circular secure if no PPT adversary can distinguish between encryptions of an n length key cycle and n encryptions of zero. In conclusion, the Block Extraction method is found to be highly effective when used in a Personal File Encryption utility. The analysis shows that the Block Extraction method is at least % faster than the leading encryption algorithm. Also, the runtime performance of the Block Extraction method has been analyzed, measured and compared to other existing algorithms. The test showed that the proposed Block Extraction method is more secure than the leading encryption algorithm. The technical feasibility of the proposed system has been tested by simulating a brute-force attack to exhaustively search or produce the missing block of the ciphertext. The proposed Block Extraction method is based on the fact that cryptanalysis on an incomplete copy of the ciphertext will not be able to produce the original and complete copy of the plaintext. The new encryption method is supplemented by an innovative key generation technique wherein a Two-factor authentication using a USB Mass Storage device that acts as a security token and a password was used. new encryption method called "Block Extraction" where blocks of ciphertext are chained, extracted and then stored into a USB Mass Storage device. In this study, we propose a plug-in for existing encryption algorithm using a. As time progress, cryptanalytic attacks against these block ciphers gets more complicated and more effective. Current block cipher design relies on purely reversible mathematical procedures to obstruct the plaintext using a cryptographic key. Passwords have already outlived their usefulness as a serious security device.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |