Summary of - A Table-Based End to End Encryption Technique Without Key Exchange
Document Type
Article
Abstract
The research presented in the article titled A Table-Based End to End Encryption Technique Without Key Exchange is an encryption method for End-to-End Encryption. The proposed method eliminates the key transfers during the encryption-decryption process and hence it is tightly secured.
Research Goals and Hypotheses: The primary goal is to develop a secure encryption method for end-to-end encryption.
Methodological Approach:
- The present study uses the Internet Protocol (IP) addresses of the sender and the receiver to securely encrypt the message.
- A table generated by a polynomial function that produces non-linear outputs is used for producing the ciphertext. This ensures that the communication is secure against multiple man-in-the-middle attacks.
Results and Discoveries:
- The algorithm is nonlinear and exhibits randomness in the generated cipher
- The complexity of the proposed algorithm is computed and is found to be Big O notation (O(n)).
Publication Date
2022
Recommended Citation
A. B. Srinivasan, H. S, and R. Ramathmika, “A table-based end to end encryption technique without key exchange,” Engineered Science, vol. 19, pp. 279_284, 2022
Publication Date
2022
Recommended Citation
Srinivasan, Aakash Bharadawaj; S, Hemalatha; and ., Ramathmika, "Summary of - A Table-Based End to End Encryption Technique Without Key Exchange" (2022). Open Access archive. 9560.
https://impressions.manipal.edu/open-access-archive/9560