Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(109.15KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
Modified One Time Pad Data Security Scheme: Random Key Generation Approach
Sharad Dnyandev Patil, Ajay Kumar , Manoj Devare
Pages - 138 - 145     |    Revised - 05-05-2009     |    Published - 18-05-2009
Published in International Journal of Computer Science and Security (IJCSS)
Volume - 3   Issue - 2    |    Publication Date - April 2009  Table of Contents
MORE INFORMATION
References   |   Cited By (3)   |   Abstracting & Indexing
KEYWORDS
Cryptography, Cryptosystem, One-time pad, encryption, , auto-key , Key enhancement, , Digital Signature.
ABSTRACT
Abstract: In this articles we show how the random key stream can be used to create lifetime supply of keys for one time pads. Here we provided the practical approach that you can use to set up your own one-time pad encryption. For simplicity let’s study how randomized key can be achieved. Random key generation can simply be obtained via use of permutation. Permutation techniques can be used in conjunction with other technique includes substitution, encryption function etc. for effective performance. The goal of this article to show how the one-time pad encryption technique can be achieved by a combining of these techniques.
CITED BY (3)  
1 S. Patil, A. Patil and A. Kumar, “Implemented Encryption Scheme Using Even (10’s and 2’s) Complement with Binary Addition Approach”, International Journal of Information Technology and Knowledge Management, 5(1), pp. 65-67, 2012.
2 X. Xie, H. Chen, Y. Wu, H. Zhang and P. Wu, “New Encryption Scheme of One-Time Pad Based on KDC”, Computer Science Intelligent Computing and Information Science Communications in Computer and Information Science, 134, pp. 51-55, 2011.
3 S. Patil and A. Kumar, “Implemented Cryptographic Symmetric Algorithm with Binary Addition/Subtraction Approach”, Journal of Computer Science and Engineering, 3(2), pp. 52-55, 2010.
ABSTRACTING & INDEXING
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 Academic Index 
5 CiteSeerX 
6 refSeek 
7 iSEEK 
8 Socol@r  
9 ResearchGATE 
10 Libsearch 
11 Bielefeld Academic Search Engine (BASE) 
12 Scribd 
13 WorldCat 
14 SlideShare 
15 PDFCAST 
16 PdfSR 
17 Chinese Directory Of Open Access 
REFERENCES
Behrouz A. Forouzan et al., “ Data Communication and Networking “ Third Edition , TATA McGRAW –HILL EDITION ISBN-0-07-058408- 7.
Larry l. Peterson et al. “Computer Networks –A Sysytem Approach ”, Third Edition , Morgan Kaufmann Publishers ISBN:0-55860-833- 8.
MANUSCRIPT AUTHORS
Mr. Sharad Dnyandev Patil
gmc polytechnic , shahada - India
sd_patil057@rediffmail.com
Dr. Ajay Kumar
- India
Dr. Manoj Devare
- India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions