z-logo
open-access-imgOpen Access
Merging Vernam Cipher stream and Rail ?Fence Algorithms and How Effective They are on Internet of Things Devices
Author(s) -
Adnan Adel Bitar,
V. Sujatha
Publication year - 2021
Publication title -
international journal of scientific research in computer science, engineering and information technology
Language(s) - English
Resource type - Journals
ISSN - 2456-3307
DOI - 10.32628/cseit2173149
Subject(s) - computer science , encryption , algorithm , fence (mathematics) , block cipher , stream cipher , laptop , running key cipher , triple des , simple (philosophy) , computer security , cipher , operating system , mathematics , philosophy , epistemology , combinatorics
Encryption is the effective way to provide the needs of security and privacy. The performance of any encryption algorithm is one of the most important parameters if not the most one in encrypting data. Also, random access memory utilization plays an excellent role in ciphering plain texts. Speaking of standard simple encryption algorithms that most of them are weak and may not be safe to use them to cipher our data communication from any threat such as Caesar algorithm [2].However, they have good results in the parameters. Nevertheless, merging these simple algorithms could generate a more powerful algorithm that takes a very long time and excessive efforts to break it. Both standard algorithms “Vernam Cipher” and “Rail-Fence stream” merged to produce the “Railve” algorithm, which has great performance and consumes a small amount of RAM. The three algorithms are applied on two devices “a mobile phone and a laptop”

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here