期刊名称:International Journal of Computer Science and Network Security
印刷版ISSN:1738-7906
出版年度:2008
卷号:8
期号:9
页码:332-337
出版社:International Journal of Computer Science and Network Security
摘要:Information security plays a major role in case of secured data transmission . In this paper some intelligent techniques have been pointed out regarding shared key generation. In case of multiparty communication the concept of shared key is essential that therein the security level is increased, as the entire key is not transmitted. Various proposed techniques have been cited based on minimal frequent set, candidate generation, partition scheme, intersection of item-set count. The paper also deals with the efficient generation of shared keys required for direct communication among co-processors without active participation of server. Hence minimization of time-complexity , proper utilization of resource as well as environment for parallel computing can be achieved with higher throughput in secured fashion. The techniques involved are cryptic methods based on feature analysis centroid analysis, inter-centroid distance , extraction scheme of vowel , index position of character , support analysis and confidence rule. We have also proposed several schemes for key evaluation based on theory of central tendencies and curves without transmission of the entire key through the channel thereby making the hacker confused regarding the value of the shared key.