International Journal of Soft Computing

Year: 2021
Volume: 16
Issue: 4
Page No. 64 - 67

A Secured Symmetric Key Encryption Technique using Images as Secret Keys

Authors : U. Sravan Goud, P.H.M.S. Raviteja, T.T.S.S.R. Phani, K. Anjesh and David Raju Kuppala

References

Agrawal, H. and P.R. Badadapure, 2016. A survey paper on elliptic curve cryptography. Int. Res. J. Eng. Technol. (IRJET.), Vol. 3, No. 4.

Forouzan, B., 2007. Cryptography and Network Security. McGraw-Hill, New Delhi, India,.

Gupta, N., 2012. Implementation of optimized des encryption algorithm upto 4 round on spartan 3. Int. J. Comput. Technol. Electron. Eng. (IJCTEE.), 2: 82-86.
Direct Link  |  

Kaushik, A., 2013. Extended Diffie-Hellman algorithm for key exchange and management. Int. J. Adv. Eng. Sci., 3: 67-70.

NehaKhatri-Valmik, M. and V.K. Kshirsagar, 1994. Blowfish algorithm. IOSR. J. Comput. Eng., 16: 80-83.

Singh, G., 2013. A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int. J. Comput. Appl., 67: 33-38.
Direct Link  |  

Soumya, K. and G.S. Kishore, 2013. Design and Implementation of Rijndael encryption algorithm based on FPGA. Int. J. Comput. Sci. Mob. Comput., 2: 120-127.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved