Browse > Article
http://dx.doi.org/10.7472/jksii.2016.17.5.97

AVK based Cryptosystem and Recent Directions Towards Cryptanalysis  

Prajapat, Shaligram (Dept. of Computer Application and Mathematics, MANIT Bhopal)
Sharma, Ashok (BU Bhopal)
Thakur, Ramjeevan Singh (Dept. of Computer Application and Mathematics, MANIT Bhopal)
Publication Information
Journal of Internet Computing and Services / v.17, no.5, 2016 , pp. 97-110 More about this Journal
Abstract
Cryptanalysis is very important step for auditing and checking strength of any cryptosystem. Some of these cryptosystem ensures confidentiality and security of large information exchange from source to destination using symmetric key cryptography. The cryptanalyst investigates the strengths and identifies weakness key as well as enciphering algorithm. With increase in key size the time and effort required to guess the correct key increases so trend is increase key size from 8, 16, 24, 32, 56, 64, 128 and 256 bits to strengthen the cryptosystem and thus algorithm continues without compromise on the cost of time and computation. Automatic Variable Key (AVK) approach is an alternative to the approach of fixing up key size and adding security level with key variability adds new dimension in the development of secure cryptosystem. Likewise, whenever any new cryptographic method is invented to replace per-existing vulnerable cryptographic method, its deep analysis from all perspectives (Hacker / Cryptanalyst as well as User) is desirable and proper study and evaluation of its performance is must. This work investigates AVK based cryptic techniques, in future to exploit benefits of advances in computational methods like ANN, GA, SI etc. These techniques for cryptanalysis are changing drastically to reduce cryptographic complexity. In this paper a detailed survey and direction of development work has been conducted. The work compares these new methods with state of art approaches and presents future scope and direction from the cryptic mining perspectives.
Keywords
Automatic Variable Key (AVK); cryptanalysis; Hacker; AI; Genetic Algorithm; Swarm Intelligence; cipher; neural network; cryptography; Artificial neural Networks (ANN); Genetic Algorithm (GA); Swarm Intelligence (SI);
Citations & Related Records
연도 인용수 순위
  • Reference
1 Prajapat Shaligram, R. S. Thakur, "Optimal Key Size of the AVK for Symmetric Key Encryption." In Covenant Journal of Information & Communication Technology , Vol.3(2), pp. 71-81, 2015 .
2 Prajapat Shaligram, R. S. Thakur "Cryptic-Mining: Association Rules Extractions Using Session Log", In proceedings of Computational Science and Its Applications ICCSA 2015, pp. 699-711, 2015. http://dx.doi.org/10.1007/978-3-319-21410-8_53   DOI
3 Prajapat Shaligram, R. S. Thakur. "Markov Analysis of AVK Approach of Symmetric Key Based Cryptosystem." In proceedings of Computational Science and Its Applications ICCSA 2015, pp. 164-176, 2015. http://dx.doi.org/10.1007/978-3-319-21413-9_12   DOI
4 Prajapat Shaligram, A. Thakur, K. Maheshwari and R. S.Thakur, "Cryptic Mining in Light of AI", in proc. of International Conference On Advances In Computing, Control And Networking - ACCN 2015, Vol. 5(2), pp. 131-135, 2015.
5 Prajapat Shaligram, K. Maheshwari, A.Thakur and R.S.Thakur, "Cryptic Mining in light of Artificial Intelligence", International Journal of Advanced Computer Science and Applications(IJACSA), Vol. 6(8), pp. 62-69, 2015. http://dx.doi.org/10.14569/IJACSA.2015.060808   DOI
6 Prajapat Shaligram, G. Parmar and R. S. Thakur, "Investigation for Efficient Cryptosystem Using SGcrypter", proc. of ICCP 2015 and IJAER, Vol. 79(10), pp. 853-858, 2015. http://dx.doi.org/10.5120/ijca2015906518
7 Prajapat Shaligram and R.S.Thakur, "Various approaches towards cryptanalysis", IJCA, Vol. 127(14),pp.15-24, October 2015.
8 Prajapat Shaligram, R. S. Thakur, "Cryptic Mining for Automatic Variable Key Based Cryptosystem", Elsevier Procedia Computer Science, Vol.78, pp. 199-209, 2016. http://dx.doi.org/10.1016/j.procs.2016.02.034   DOI
9 Prajapat Shaligram, R. S. Thakur, "Realization of information exchange with Fibo-Q based Symmetric Cryptosystem", International Journal of Computer Science and Information Security, IJCSIS, Vol. 14(2), pp. 216-223, 2016.
10 Prajapat Shaligram, R. S. Thakur, "Cryptic Mining: Apriori Analysis of Parameterized Automatic Variable Key based Symmetric Cryptosystem", International Journal of Computer Science and Information Security, IJCSIS, Vol. 14(2), pp. 233-246, 2016.
11 Prajapat Shaligram, R.S. Thakur, "Key Diffusion Approach for AVK based Cryptosystem", Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies,(ICTCS -16), 78, 2016. http://dx.doi.org/10.1145/2905055.2905288   DOI
12 R.S. Goswami ,S. K. Chakraborty,A. Bhinia ,C. T. Bhunia," Various New Methods of Implementing AVK", in Proc. of 2nd International Conference on Advances in Computer Science and Engineering, 2013.
13 Prajapat Shaligram, D. Rajput, R. S. Thakur, "Time variant approach towards symmetric key", In proceedings of IEEE Science and Information Conference (SAI), pp.398-405, 2013.
14 R. S. Goswami ,S. K. Chakraborty ,A. Bhunia ,C. T. Bhunia," New Approach towards Generation of Automatic Variable Key to Achieve Perfect Security", in Proc. of Information Technology: New Generations (ITNG), pp. 489-491, 2013.
15 B. Bhuyan, P. Chakrabarti, A. Chowdhuri, F. Masulli, C. T. Bhunia, " Implementation of Automatic Variable Key with Chaos Theory and Studies Thereof", The IUP Journal of Computer Sciences, Vol. 5(4), pp. 22-32, 2011.
16 R. S. Goswami, S. K. Chakraborty, A, b. Bhinia, C. T. Bhunia, "Approach towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison", International Journal of Computer Applications, Vol. 82(1), 2013.
17 P. Chakraborty, C.T. Bhunia, B. Bhuyan, "Variable Key: A new investigation in cryptography and results thereof", IJITKM, 2012.
18 Oliveira C., Jose A., and Carlos A. C., "Clustering and categorization applied to cryptanalysis", Cryptologia, Vol. 30(3), pp. 266-280, 2006.   DOI
19 Prajapat Shaligram, Sharma A., Swami S., Rajput D., Singroli B., R. S. Thakur, "Sparse approach for realizing AVK for Symmetric Key Encryption", International Journal of Recent Development in Engineering and Technology (IJRDET), Vol. 2(4), pp. 15-18, 2014.
20 H. H. Ngo, X. Wu, P. D. Le, C. Wilson, and B. Srinivasan, "Dynamic Key Cryptography and Applications", In Proc. of International Journal of Network Security, Vol. 10(3), pp. 161-174, 2010.
21 Prajapat Shaligram, A. Jain and R. S. Thakur, "A Novel Approach For Information Security With Automatic Variable Key Using Fibonacci Q-Matrix", International Journal of Computer & Communication Technology (IJCCT).
22 A. p. Singh, S. Kumar, "A new method for generation of variable session keys", International Journal Of Scientific Research And Education IJSAE, Vol. 2(8), pp. 1578-1581, 2014.
23 P. Chakrabarti, B Bhuyan, A. Chowdhuri, C.T.Bhunia, "Novel approach towards realizing optimum data transfer and Automatic Variable Key(AVK) in cryptography", International Journal of Computer Science and Network Security, Vol. 8(5), pp. 241-250, 2008.
24 G. E. Pickard, R. I. Khazan, B. W. Fuller, J. A. Cooley,"DSKE: Dynamic Set Key Encryption analyze the performance of DSKE", MIT Lincoln Laboratory,244 Wood St Lexington MA, 02451,pp. 1-7, 2012.
25 Prajapat Shaligram, Saxena S., Jain A. and Sharma P.," Implementation of Information Security with Fibonacci Q-Matrix", in proceedings of ICICS-2012 and Special Issue of IJECCE, pp. 118-124, 2012.
26 R. S. Goswami, S. K. Chakraborty, A. Bhunia, C. T. Bhunia, "Generation of Automatic Variable Key under Various Approaches in Cryptography System", Journal of the Institution of Engineers (India): Series B, Vol. 94(4), pp. 215-220, 2013. http://dx.doi.org/10.1007/s40031-013-0066-8   DOI