List of Journals    /    Call For Papers    /    Subscriptions    /    Login
By Author By Title
 About CSC Journals
 CSC Journals Objectives
 List of Journals
 Call For Papers CFP
 Special Issue CFP
 Submission Guidelines
 Peer Review Process
 Helpful Hints For Getting Published
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 Reviewer Guidelines
 Editor Guidelines
 Join Us As Editor
 Launch Special Issue
 Suggest New Journal
 Browse CSC Library
 Open Access Policy
 Conference Partnership Program (CPP)
 Abstracting & Indexing
 Discounted Packages
 Archival Subscriptions
 How to Subscribe
 Subscriptions Agents
 Order Form
Modified One Time Pad Data Security Scheme: Random Key Generation Approach
Full text
International Journal of Computer Science and Security (IJCSS)
Table of Contents
Download Complete Issue    PDF(1.98MB)
Volume:  3    Issue:  2
Pages:  62-153
Publication Date:   April 2009
ISSN (Online): 1985-1553
138 - 145
Published Date   
CSC Journals, Kuala Lumpur, Malaysia
Keywords   Abstract   References   Cited by   Related Articles   Collaborative Colleague
KEYWORDS:   Cryptography, Cryptosystem, One-time pad, encryption, , auto-key , Key enhancement, , Digital Signature. 
This Manuscript is indexed in the following databases/websites:-
1. Directory Of Open Access Journals (DOAJ)
2. Scribd
3. Docstoc
5. ScientificCommons
6. WorldCat
7. CiteSeerX
8. Google Scholar
9. Academic Index
10. Bielefeld Academic Search Engine (BASE)
11. ResearchGATE
12. refSeek
13. Microsoft Academic Search
14. iSEEK
15. Socol@r
16. Academic Journals Database
17. Libsearch
18. slideshare
19. Chinese Directory Of Open Access
Abstract: In this articles we show how the random key stream can be used to create lifetime supply of keys for one time pads. Here we provided the practical approach that you can use to set up your own one-time pad encryption. For simplicity let’s study how randomized key can be achieved. Random key generation can simply be obtained via use of permutation. Permutation techniques can be used in conjunction with other technique includes substitution, encryption function etc. for effective performance. The goal of this article to show how the one-time pad encryption technique can be achieved by a combining of these techniques.  
1 Larry l. Peterson et al. “Computer Networks –A Sysytem Approach ”, Third Edition , Morgan Kaufmann Publishers ISBN:0-55860-833- 8.
2 Behrouz A. Forouzan et al., “ Data Communication and Networking “ Third Edition , TATA McGRAW –HILL EDITION ISBN-0-07-058408- 7.
1 S. Patil and A. Kumar, “Implemented Cryptographic Symmetric Algorithm with Binary Addition/Subtraction Approach”, Journal of Computer Science and Engineering, 3(2), pp. 52-55, 2010.
2 S. Patil, A. Patil and A. Kumar, “Implemented Encryption Scheme Using Even (10’s and 2’s) Complement with Binary Addition Approach”, International Journal of Information Technology and Knowledge Management, 5(1), pp. 65-67, 2012.
3 X. Xie, H. Chen, Y. Wu, H. Zhang and P. Wu, “New Encryption Scheme of One-Time Pad Based on KDC”, Computer Science Intelligent Computing and Information Science Communications in Computer and Information Science, 134, pp. 51-55, 2011.
1 TechRepublic
2 yasni
4 Siddhant College of Engineering
Sharad Dnyandev Patil : Colleagues
Ajay Kumar : Colleagues
Manoj Devare : Colleagues  
  Untitled Document
Copyrights (c) 2012 Computer Science Journals. All rights reserved.
Best viewed at 1152 x 864 resolution. Microsoft Internet Explorer.
Copyrights & Usage: Articles published by CSC Journals are Open Access. Permission to copy and distribute any other content, images, animation and other parts of this website is prohibited. CSC Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.