In this work a non linear model is going to be used which develops data distributed over an identified value which is used as nonce (IV). The key to be considered in the model is a combination of three values K, p & Cp which vary with the data developed. Thus by properly considering a combination of key values which are non linear in nature, data is derived from the developed model. This set of values is considered as a sub key for one round. A time stamp is considered which identifies the number of rounds of the given model. The process is repeated for different time stamp rounds in the encryption mechanism. Thus the model involves an identified value which is used as nonce (IV), a considered non linear set of values which are used as key and different timings as time stamp rounds which are very important parameters in symmetric data encryption schemes. This Model supports not only security but also timeliness of encryption mechanism and also acknowledgement support between the participating parties.
[1]
S. Patankar.
Numerical Heat Transfer and Fluid Flow
,
2018,
Lecture Notes in Mechanical Engineering.
[2]
Lester S. Hill.
Concerning Certain Linear Transformation Apparatus of Cryptography
,
1931
.
[3]
William Stallings,et al.
Cryptography and network security
,
1998
.
[4]
Phillip Rogaway,et al.
Nonce-Based Symmetric Encryption
,
2004,
FSE.
[5]
Åke Björck,et al.
Numerical Methods
,
1995,
Handbook of Marine Craft Hydrodynamics and Motion Control.
[6]
A VinayaBabu,et al.
Web and Network Communication Security Algorithms
,
2006
.
[7]
A. Vinaya Babu,et al.
A generalized scheme for data encryption technique using a randomized matrix key
,
2007
.
[8]
A. Booth.
Numerical Methods
,
1957,
Nature.
[9]
Lester S. Hill.
Cryptography in An Algebraic Alphabet
,
1929
.