Download now Free registration required
In this paper, a non linear model is going to be used which develops data distributed over an Identified Value which is used as nonce (IV). Thus by properly considering a combination of key values which are non linear in nature, data is derived from the developed model. This set of values is considered as a sub key for one round. A time stamp is considered which identifies the number of rounds of the given model. The process is repeated for different time stamp rounds in the encryption mechanism.
- Format: PDF
- Size: 124.64 KB