Paper 2014/576
Vernam Two
Dan P. Milleville
Abstract
The Vernam Algorithm has long been unable to be commercially used because it requires the key to be transmitted with the ciphertext, an obvious security hazard. What has been developed with this methodology is to take a fixed key, XOR 4 randomly selected/extracted segments of this key together forming an 'Effective Key Stream' and XOR'ing that with the plaintext. With both the sender and receiver possessing the fixed key, using this new methodology circumvents the requirement to send the key along with the ciphertext. Considering the drastic reduction in computations needed, this algorithm executes at better than four times faster than the AES. With our society becoming more and more digitally oriented, faster security is needed.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- •distributed cryptography
- Contact author(s)
- dmilleville @ comcast net
- History
- 2015-07-27: last of 6 revisions
- 2014-07-24: received
- See all versions
- Short URL
- https://ia.cr/2014/576
- License
-
CC BY