Cryptology ePrint Archive: Report 2014/576

Vernam Two

Dan P. Milleville

Abstract: The Vernam Algorithm has long been unable to be commercially used because it requires the key to be transmitted with the ciphertext, an obvious security hazard. What has been developed with this methodology is to take a fixed key, XOR 4 randomly selected/extracted segments of this key together forming an 'Effective Key Stream' and XOR'ing that with the plaintext. With both the sender and receiver possessing the fixed key, using this new methodology circumvents the requirement to send the key along with the ciphertext.

Considering the drastic reduction in computations needed, this algorithm executes at better than four times faster than the AES. With our society becoming more and more digitally oriented, faster security is needed.

Category / Keywords: secret-key cryptography / •distributed cryptography

Date: received 23 Jul 2014

Contact author: dmilleville at comcast net

Available format(s): PDF | BibTeX Citation

Version: 20140724:125224 (All versions of this report)

Discussion forum: Show discussion | Start new discussion

[ Cryptology ePrint archive ]