Results 1 to 10 of about 41,294 (296)
TORDES-THE NEW SYMMETRIC KEY ALGORITHM [PDF]
The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems.
Pawitar Dulari, Ajay Bhushan
doaj +2 more sources
A Comparative Study of Symmetric Key Algorithms
Security is the prime issue while transferring information across a network. Therefore, the concept of encryption and decryption of information was introduced. Cryptography is a technique of converting plain information into encrypted text. This is done so that only legitimate users can access the data being sent.
Dipu Jo George, Tony Thomas
openalex +2 more sources
Round key formation algorithm for symmetric block encryption algorithms [PDF]
In this work, an algorithm for generating round keys of any length for symmetric block encryption algorithms was developed. The degree of randomness of the sequences generated using the key and initialization vector was evaluated.
Umarovich Jurayev Gayrat +2 more
doaj +2 more sources
Text Encryption Analysis of Modified Symmetric Keys using Genetic Algorithm on Caesar Cipher and One Time Pad [PDF]
The problem of data security is essential because data must be maintained securely and in its integrity, starting with the sending procedure and ending with the intended recipient.
Julia Kurniasih, Dian Tiara Rezalti
doaj +2 more sources
A Secret Key Classification Framework of Symmetric Encryption Algorithm Based on Deep Transfer Learning [PDF]
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities.
Xiaotong Cui +6 more
doaj +2 more sources
Classical and physical security of symmetric key cryptographic algorithms [PDF]
Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic communication. The symmetric key algorithms, known as the ciphers, are to satisfy certain requirements in order to be considered secure, which are broadly classified as Classical Attack and Physical Attack.
Anubhab Baksi
+5 more sources
NARSKCA: Novel and robust symmetric key cryptography algorithm
In this research paper, a novel and strong symmetric key cryptography algorithm is proposed. NARSKCA is based on several symmetric cryptographic algorithms. NARSKCA is very simple that uses character converting algorithm, Fibonacci Number Series, Lucas Number series and bitwise XOR.
Balajee Maram, Yogesh Kumar, K. L. Rao
openalex +3 more sources
Content Based Symmetric Key Algorithm
AbstractWith the growth in technology, there is always a need of good encryption method which may provide better security and authenticity with lesser computational complexities. Although there are a lot of symmetric key algorithms which are already been proposed, yet we are going to propose a content based symmetric key algorithm.
Manish Shrivastava +2 more
openalex +2 more sources
PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices [PDF]
With the growing number of heterogeneous resource-constrained devices connected to the Internet, it becomes increasingly challenging to secure the privacy and protection of data. Strong but efficient cryptography solutions must be employed to deal with this problem, along with methods to standardize secure communications between these devices.
Daniel A. F. Saraiva +5 more
openalex +7 more sources
Two Layer Image Encryption using Symmetric Key Algorithms
Security of data (text, audio, and images) is becoming more complex with the increment in its amount. In order to upsurge the reliability, the captcha (Completely Automated Public Turing test to tell Computers and Humans Apart) is used to ensure authenticity.
Sumakshi Chauhan +2 more
openalex +2 more sources

