This book prescribed various low computation based symmetric encryption techniques which has major relevance in terms of security in modern day s utilities. Starting from introductory definitions, six symmetric techniques RCA, RKR, RSKA, CAOPB, RMOPB and CRKRTAB, their analysis and usages are described. Five are cyclic and rest is cascaded in nature. Various parametric tests such as Chi Square, frequency distribution are applied and analyzed along with secrete and session key based encryption process. For the purpose of easy understanding examples are associated with each along with the...
This book prescribed various low computation based symmetric encryption techniques which has major relevance in terms of security in modern day s util...