A New Random Encryption Algorithm for Character Type Cipher

Article Preview

Abstract:

Character type cipher is always used in web application system and can be deciphered by the illegal users through "run dictionary", so, a new random encryption algorithm for character type cipher is put forward in this paper. The encryption parameters are randomly generated in the algorithm, and random confusion is adopted in the cipher text structure, so the same plaintext can produce different ciphertexts.the experimentation shows that the algorithm is feasibility and validity.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3-7

Citation:

Online since:

October 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zheng, Xiaoling. Research for the application and safety of MD5 algorithm in password authentication. Proceedings - 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2012, pp.2216-2219, (2012).

DOI: 10.1109/fskd.2012.6234010

Google Scholar

[2] Wang, Feng. Constant memory optimizations in MD5 Crypt cracking algorithm on GPU-accelerated supercomputer using CUDA. ICCSE 2012 - Proceedings of 2012 7th International Conference on Computer Science and Education, pp.638-642, (2012).

DOI: 10.1109/iccse.2012.6295156

Google Scholar

[3] Sasaki, Yu. Collisions of MMO-MD5 and their impact on original MD5. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 6737 LNCS, pp.117-133, (2011).

DOI: 10.1007/978-3-642-21969-6_8

Google Scholar

[4] Yong-Xia, Zhao. MD5 research. 2010 International Conference on MultiMedia and Information Technology, MMIT 2010, v 2, pp.271-273, (2010).

DOI: 10.1109/mmit.2010.186

Google Scholar

[5] Li, Ji-Rui. Online shopping system based on improved MD5. Communications in Computer and Information Science, v 307 CCIS, n PART 1, pp.51-57, (2012).

Google Scholar

[6] Chen, Shi-Wei, Jin, Chen-Hui. New set of sufficient conditions for MD5 collisions. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, v 31, n 3, pp.740-744, March (2009).

Google Scholar

[7] Shi, Zhicai, Yang, Canqun, Wu, Qiang. Scalable MD5 Crypt cracker on petascale supercomputer. Advanced Materials Research, v 532-533, pp.1080-1084, (2012).

DOI: 10.4028/www.scientific.net/amr.532-533.1080

Google Scholar