Summary of - A Table-Based End to End Encryption Technique Without Key Exchange

Document Type

Article

Abstract

The research presented in the article titled A Table-Based End to End Encryption Technique Without Key Exchange is an encryption method for End-to-End Encryption. The proposed method eliminates the key transfers during the encryption-decryption process and hence it is tightly secured.

Research Goals and Hypotheses: The primary goal is to develop a secure encryption method for end-to-end encryption.

Methodological Approach:

  1. The present study uses the Internet Protocol (IP) addresses of the sender and the receiver to securely encrypt the message.
  2. A table generated by a polynomial function that produces non-linear outputs is used for producing the ciphertext. This ensures that the communication is secure against multiple man-in-the-middle attacks.

Results and Discoveries:

  1. The algorithm is nonlinear and exhibits randomness in the generated cipher
  2. The complexity of the proposed algorithm is computed and is found to be Big O notation (O(n)).

Publication Date

2022

Recommended Citation

A. B. Srinivasan, H. S, and R. Ramathmika, “A table-based end to end encryption technique without key exchange,” Engineered Science, vol. 19, pp. 279_284, 2022

Publication Date

2022

Share

COinS