Time Complexity Reduction for the Application of Stream Cipher System Based XOR Free Operation
Radhakrishna Dodmane1, Ganesh Aithal2, Surendra Shetty3

1Radhakrishna Dodmane, CSE department, NMAM Institute of Technology Nitte, Karkala, India.
2Ganesh Aithal, Vice-principal, SVMIT Bantakal, Udupi, India.
3Surendra Shetty, MCA department, NMAM Institute of Technology Nitte, Karkala, India. 

Manuscript received on 07 August 2019. | Revised Manuscript received on 14 August 2019. | Manuscript published on 30 September 2019. | PP: 5402-5408 | Volume-8 Issue-3 September 2019 | Retrieval Number: C6176098319/2019©BEIESP | DOI: 10.35940/ijrte.C6176.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Providing security to user information are the most important aspects of today’s internet applications. Due to the very fast increase in the internet applications, the value of data exchange also became important. Hence, the better security and fast processing of the system is at high demand in the communication-related communities. Cryptography is one such area of providing data security. The two major criteria that specify the significance of a cryptographic algorithm are the security provided against the various attacks and the time to perform the operations. The proposed system is a solution to the cryptographic system to reduce the time complexity by retaining the security of the algorithm as it is. The solution proposed is to reduce the processing time required for the XOR function. This solution is by generating; XOR values for the vector space mentioned by the tuple, later replace the same wherever required. These values of XOR depend on the tuple, which represents the vector. Algorithm and time complexity for the generation of the vector space of XOR values for the proposed space evaluated. The result of the work compared based on two Standard symmetric-key cipher systems, Advanced Encryption Standard (AES) and Blowfish. The results are also tested and analyzed for different data size for the time complexity.
Keywords: Advanced Encryption Standard (AES), Blowfish, Vector Space and XOR free.

Scope of the Article:
IoT Application and Communication Protocol