Results 11 to 20 of about 130,132 (369)

Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm

open access: yesJournal of Physics: Conference Series, 2021
There is a risk in the process of exchanging information, especially text information. To reduce that risk, one of cryptographic method can be applied. That is Vigenere Cipher algorithm. But the Vigenere Cipher algorithm have a weakness.
Z. Qowi, N. Hudallah
semanticscholar   +1 more source

Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace

open access: yesApplied Sciences, 2022
The ratio at which the number of users is increasing in cloud computing, the same as the number of data destruction, has doubled. Various algorithms have been designed to secure cloud servers to prevent an attacker from attacking, but they cannot protect
Muhammad Nadeem   +7 more
doaj   +1 more source

New Technique using Fibonacci Matrices with Play-Fair System in Cryptography

open access: yesTikrit Journal of Pure Science, 2022
In this paper we introduce a new Technique, this technique depends on the Fibonacci sequence and Fibonacci Matrices with a Play- Fair which is one of the cryptography systems.
Awni M.Gaftan   +2 more
doaj   +1 more source

Evolusi Cipher Vigenere dalam Peningkatan Pengamanan Informasi

open access: yesJurnal informatika UPGRIS, 2021
Pertukaran informasi melalui ruang publik masih menyisakan kerentanan keamanan, sehingga perlu mekanisme pengamanan melalui proses kriptografi. Salah satu model kriptografi yang dapat bertahan hingga lebih dari 300 tahun adalah Vigenere Cipher, sebelum ...
Eka Ardhianto   +3 more
doaj   +1 more source

SLIM: A Lightweight Block Cipher for Internet of Health Things

open access: yesIEEE Access, 2020
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers.
Bassam Aboushosha   +4 more
semanticscholar   +1 more source

Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher [PDF]

open access: yes, 2005
In ISNN'04, a novel symmetric cipher was proposed, by combining a chaotic signal and a clipped neural network (CNN) for encryption. The present paper analyzes the security of this chaotic cipher against chosen-plaintext attacks, and points out that this ...
B. Schneier   +5 more
core   +5 more sources

The cipher SHARK [PDF]

open access: yes, 1996
We present the new block cipher SHARK. This cipher combines highly non-linear substitution boxes and maximum distance separable error correcting codes (MDS-codes) to guarantee a good diffusion. The cipher is resistant against differential and linear cryptanalysis after a small number of rounds.
Rijmen, Vincent   +4 more
openaire   +2 more sources

The Subterranean 2.0 Cipher Suite

open access: yesIACR Transactions on Symmetric Cryptology, 2020
This paper presents the Subterranean 2.0 cipher suite that can be used for hashing, MAC computation, stream encryption and several types of authenticated encryption schemes. At its core it has a duplex object with a 257-bit state and a lightweight single-
J. Daemen   +3 more
semanticscholar   +1 more source

Deciphering a novel image cipher based on mixed transformed Logistic maps [PDF]

open access: yes, 2015
Since John von Neumann suggested utilizing Logistic map as a random number generator in 1947, a great number of encryption schemes based on Logistic map and/or its variants have been proposed. This paper re-evaluates the security of an image cipher based
Cheng, Ge   +4 more
core   +1 more source

Stratified Sampling to Define Levels of Petrographic Variation in Coal Beds: Examples from Indonesia and New Zealand

open access: yesIndonesian Journal on Geoscience, 2016
DOI: 10.17014/ijog.3.1.29-51Stratified sampling of coal seams for petrographic analysis using block samples is a viable alternative to standard methods of channel sampling and particulate pellet mounts.
Tim A. Moore
doaj   +1 more source

Home - About - Disclaimer - Privacy