Abstract

In the recent days people use a variety of online software applications to move data from one location to another. To secure personal data from hackers, software or applications use cryptographicbased algorithms. The encryption and decryption processes are the foundation of the cryptographic algorithm, which will be carried out with the help of a key. Cryptographic algorithms employ automatic key generation that starts with the user’s password, whereas another generating key directly interprets the password. A symmetric algorithm uses the same key for both encryption and decryption. For key generation, symmetric algorithms use a second or subsidiary method. The password is protected using this key generation process from various key attacks. The key generation algorithm functions as an interpreter, transforming a password from a human-readable form to a machine-readable form. An increase in permutations and combinations helps to protect the password; additional characteristics are being added to the algorithm. To get around the restricted key bit size, this paper proposed the KEY SECURE-KEY (KSKEY) algorithm. However, increasing the key size is not a suitable way to encrypt data because multi-core processors in modern microprocessors are significantly increasing processingspeed.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.