You are looking at a specific version 20140724:125224 of this paper. See the latest version.

Paper 2014/576

Vernam Two

Dan P. Milleville

Abstract

The Vernam Algorithm has long been unable to be commercially used because it requires the key to be transmitted with the ciphertext, an obvious security hazard. What has been developed with this methodology is to take a fixed key, XOR 4 randomly selected/extracted segments of this key together forming an 'Effective Key Stream' and XOR'ing that with the plaintext. With both the sender and receiver possessing the fixed key, using this new methodology circumvents the requirement to send the key along with the ciphertext. Considering the drastic reduction in computations needed, this algorithm executes at better than four times faster than the AES. With our society becoming more and more digitally oriented, faster security is needed.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
•distributed cryptography
Contact author(s)
dmilleville @ comcast net
History
2015-07-27: last of 6 revisions
2014-07-24: received
See all versions
Short URL
https://ia.cr/2014/576
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.