International Journal of Network Security
In this paper, a model is going to be used which develops data distributed over an identified value which is used as nonce (IV). By properly considering an empirical value, data is derived from the developed model. This empirical value is considered as a key. The process is repeated for different timings which are used as time stamps in the encryption mechanism. Thus, this paper generates a distributed sequence which is used as sub key.