Authors: Rayi Sailaja; C. Rupa; A.S.N. Chakravarthy
Addresses: Aditya College of Engineering and Tech, Surampalem, (E.G) Dist, India ' VR Siddhardha Engineering College, Vijayawada, India ' JNTUK-UCEV, Vizianagaram, India
Abstract: Today, there is a terrific rise in internet security attacks. Even though many encryption algorithms are developed to fight against the attacks, most of them are key centric algorithms. The security of algorithm is very much dependent on security of the key. A new cryptographic algorithm has been proposed based on internal key table, Euclid's theorem and fuzzy logic. The proposed algorithm does not involve key exchange or sharing. It takes the help of internal key table whose indexes will be converted in to numeric form using Euclid's and fuzzy logic to get the cipher text. The secrecy of the communication will be compromised if the key is compromised. So there is a desperate need for key-less algorithms to thwart against man-in-the-middle and spoofing attacks. The proposed approach will provide a solution for key exchange attacks. The performance of proposed work is evaluated by comparing with existing approaches and it shows better results.
Keywords: fuzzy logic; Euclid's algorithm; key table.
International Journal of Information Privacy, Security and Integrity, 2018 Vol.3 No.4, pp.253 - 267
Available online: 12 Nov 2018 *Full-text access for editors Access for subscribers Purchase this article Comment on this article