Results 1 to 10 of about 41,294 (296)

TORDES-THE NEW SYMMETRIC KEY ALGORITHM [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2012
The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems.
Pawitar Dulari, Ajay Bhushan
doaj   +2 more sources

A Comparative Study of Symmetric Key Algorithms

open access: diamondInternational Journal of Computer Science and Mobile Computing, 2023
Security is the prime issue while transferring information across a network. Therefore, the concept of encryption and decryption of information was introduced. Cryptography is a technique of converting plain information into encrypted text. This is done so that only legitimate users can access the data being sent.
Dipu Jo George, Tony Thomas
openalex   +2 more sources

Round key formation algorithm for symmetric block encryption algorithms [PDF]

open access: diamondE3S Web of Conferences
In this work, an algorithm for generating round keys of any length for symmetric block encryption algorithms was developed. The degree of randomness of the sequences generated using the key and initialization vector was evaluated.
Umarovich Jurayev Gayrat   +2 more
doaj   +2 more sources

Text Encryption Analysis of Modified Symmetric Keys using Genetic Algorithm on Caesar Cipher and One Time Pad [PDF]

open access: diamondIJIE (Indonesian Journal of Informatics Education), 2022
The problem of data security is essential because data must be maintained securely and in its integrity, starting with the sending procedure and ending with the intended recipient.
Julia Kurniasih, Dian Tiara Rezalti
doaj   +2 more sources

A Secret Key Classification Framework of Symmetric Encryption Algorithm Based on Deep Transfer Learning [PDF]

open access: goldApplied Sciences, 2023
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities.
Xiaotong Cui   +6 more
doaj   +2 more sources

Classical and physical security of symmetric key cryptographic algorithms [PDF]

open access: gold2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), 2021
Symmetric key cryptography is one of the cornerstones of security in the modern era of electronic communication. The symmetric key algorithms, known as the ciphers, are to satisfy certain requirements in order to be considered secure, which are broadly classified as Classical Attack and Physical Attack.
Anubhab Baksi
  +5 more sources

NARSKCA: Novel and robust symmetric key cryptography algorithm

open access: diamondInternational Journal of Scientific World, 2015
In this research paper, a novel and strong symmetric key cryptography algorithm is proposed. NARSKCA is based on several symmetric cryptographic algorithms. NARSKCA is very simple that uses character converting algorithm, Fibonacci Number Series, Lucas Number series and bitwise XOR.
Balajee Maram, Yogesh Kumar, K. L. Rao
openalex   +3 more sources

Content Based Symmetric Key Algorithm

open access: diamondProcedia Computer Science, 2016
AbstractWith the growth in technology, there is always a need of good encryption method which may provide better security and authenticity with lesser computational complexities. Although there are a lot of symmetric key algorithms which are already been proposed, yet we are going to propose a content based symmetric key algorithm.
Manish Shrivastava   +2 more
openalex   +2 more sources

PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices [PDF]

open access: goldSensors, 2019
With the growing number of heterogeneous resource-constrained devices connected to the Internet, it becomes increasingly challenging to secure the privacy and protection of data. Strong but efficient cryptography solutions must be employed to deal with this problem, along with methods to standardize secure communications between these devices.
Daniel A. F. Saraiva   +5 more
openalex   +7 more sources

Two Layer Image Encryption using Symmetric Key Algorithms

open access: diamondInternational Journal of Innovative Technology and Exploring Engineering, 2020
Security of data (text, audio, and images) is becoming more complex with the increment in its amount. In order to upsurge the reliability, the captcha (Completely Automated Public Turing test to tell Computers and Humans Apart) is used to ensure authenticity.
Sumakshi Chauhan   +2 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy